CN111667275B - User identity recognition method, device, equipment and medium thereof - Google Patents

User identity recognition method, device, equipment and medium thereof Download PDF

Info

Publication number
CN111667275B
CN111667275B CN202010566870.0A CN202010566870A CN111667275B CN 111667275 B CN111667275 B CN 111667275B CN 202010566870 A CN202010566870 A CN 202010566870A CN 111667275 B CN111667275 B CN 111667275B
Authority
CN
China
Prior art keywords
consumption
identification
user
message
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010566870.0A
Other languages
Chinese (zh)
Other versions
CN111667275A (en
Inventor
陈春勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010566870.0A priority Critical patent/CN111667275B/en
Publication of CN111667275A publication Critical patent/CN111667275A/en
Application granted granted Critical
Publication of CN111667275B publication Critical patent/CN111667275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a user identity recognition method, a device, equipment and a medium thereof, wherein the method comprises the steps of receiving a consumption operation in an operation interface of a consumption client; in response to a consumption operation, displaying an identification message in an operation interface, wherein the identification message is used for prompting an execution user of the consumption operation to identify based on a consumption value corresponding to the consumption operation and a historical consumption amount related to a binding user of the consumption client; and in response to the identification operation input for the identification message, displaying a mode switching message in the operation interface. According to the embodiment of the application, the historical consumption data provided by the payment platform related to the bound user and the accumulated consumption amount of the user are monitored, so that the identity recognition of the executing user is intelligently triggered, and the transitional consumption behavior of the executing user can be effectively prevented.

Description

User identity recognition method, device, equipment and medium thereof
Technical Field
The present application relates generally to the field of network security technologies, and in particular, to a user identity identification method, apparatus, device, and medium thereof.
Background
In recent years, with the development of an online entertainment platform, the online entertainment platform enhances online interaction relationship between users through a viewing function. On-line entertainment platforms, such as live broadcast platforms, interactive platforms. The user may enjoy viewing live video, or paying attention to an article, to a host or an article author, etc.
In the bonus operation, frequent operations of the bonus function by a part of minor users may result in a huge account amount loss. Although part of the online entertainment platform may prevent consumer behavior of underage users by setting different modes of operation. For example, setting the teenager mode limits the authority of the minors to view, browse information, cannot use the viewing function, and the like.
Disclosure of Invention
In view of the foregoing drawbacks or shortcomings of the prior art, it is desirable to provide a user identification method, apparatus, device, and storage medium thereof, to prevent transitional consumption behavior caused by a current user using a consumption function of a client.
In a first aspect, an embodiment of the present application provides a method for identifying a user, where the method includes:
receiving a consumption operation in an operation interface of a consumption client;
and responding to the consumption operation, displaying an identification message in an operation interface, wherein the identification message is used for prompting the user performing the identification on the consumption operation based on the consumption value corresponding to the consumption operation and the historical consumption amount related to the binding user of the consumption client. The historical consumption is calculated based on historical consumption data within a preset time range provided by a target paymate associated with the bound user.
And responding to the identification operation input aiming at the identity identification message, displaying a mode switching message in an operation interface, wherein the mode switching message is used for prompting the consumer client to switch from a normal consumption mode to a permission control mode when the identity of the executing user is inconsistent with the identity of the binding user, and the permission control mode is used for temporarily prohibiting the executing of the consumption operation of the user.
In a second aspect, an embodiment of the present application provides a user identity recognition device, including:
the operation receiving unit is used for receiving the consumption operation in the operation interface of the consumption client;
the identity recognition unit is used for responding to the consumption operation, displaying an identity recognition message in the operation interface, wherein the identity recognition message is used for prompting the user to execute the consumption operation to recognize based on the consumption value corresponding to the consumption operation and the historical consumption amount related to the bound user of the consumption client, and the historical consumption amount is calculated based on the historical consumption data in a preset time range provided by a target payment platform related to the bound user;
and the permission control unit is used for responding to the identification operation input for the identity identification message, displaying a mode switching message in the operation interface, and controlling the consumption client to switch from a normal consumption mode to a permission control mode when the identity of the executing user is not consistent with the identity of the binding user, wherein the permission control mode is used for temporarily prohibiting the consumption operation of the executing user.
In a third aspect, embodiments of the present application provide an electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing a method as described in embodiments of the present application when the program is executed.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium having stored thereon a computer program for:
the computer program, when executed by a processor, implements a method as described in embodiments of the present application.
The user identity recognition method, the device, the equipment and the storage medium thereof provided by the embodiment of the application are characterized in that the method receives the consumption operation in the operation interface of the consumption client; based on the accumulated consumption amount of the consumption client and the historical consumption amount related to the binding user of the consumption client, the identity of the executing user of the operation is identified based on the consumption operation trigger, and when the identity of the executing user is inconsistent with the identity of the binding user, the consumption client is controlled to switch from a normal consumption mode to a permission control mode, and the permission control mode is used for temporarily prohibiting the execution of the consumption operation of the user. According to the embodiment of the application, the consumption operation of the executing user is intelligently identified to trigger the identity identification of the executing user, so that the safety of the binding user is improved, and the unauthorized consumption behavior of the executing user is effectively prevented.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 shows a schematic structural diagram of an implementation environment according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a user identification method according to an embodiment of the present application;
fig. 3 is a schematic flow chart of a user identification method according to an embodiment of the present application;
FIG. 4 illustrates a schematic diagram of a live interface provided by an embodiment of the present application;
fig. 5 shows a schematic view of a live interface prompt popup window provided in an embodiment of the present application;
FIG. 6 shows a schematic diagram of a fingerprint recognition prompt interface provided in an embodiment of the present application;
FIG. 7 is a schematic diagram of a forbidden range hint message interface provided by embodiments of the present application;
fig. 8 is a schematic flow chart of a user identification method according to an embodiment of the present application;
fig. 9 shows a live interface identification popup window provided in an embodiment of the present application;
fig. 10 shows a live interface recognition result popup window provided in an embodiment of the present application;
fig. 11 is a schematic flow chart of a user identification method according to an embodiment of the present application;
FIG. 12 is a block diagram illustrating an exemplary configuration of a user identification device according to an embodiment of the present application;
fig. 13 shows a schematic diagram of a computer system suitable for use in implementing an electronic device or server of an embodiment of the present application.
Detailed Description
The present application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the related disclosure and not limiting thereof. It should be further noted that, for convenience of description, only the portions related to the disclosure are shown in the drawings.
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an implementation environment according to an embodiment of the present application.
As shown in fig. 1, the implementation environment includes: terminal equipment 101, server 102. The terminal device 101 and the server 102 are connected to each other through a communication network, which may include various connection types, such as a wired communication link, a wireless communication link, or an optical fiber cable. A user may interact with the server 102 via a communication network using the terminal device 101. Various clients may be installed on the terminal device 101, and the clients may be implemented based on various applications. For example, a live audience client is installed on the terminal device 101, receives an operation input by a user, acquires data corresponding to the operation in response to the operation, and transmits the data to the server 102 via a communication network. After analyzing the data, the server 102 sends a response message to the terminal device 101, and the terminal device 101 displays the response message or prompts the user to perform related operations in response to the response message.
The terminal device 101 may be hardware or software. When the terminal device 101 is hardware, it may be various electronic devices including, but not limited to, smart phones, tablet computers, notebook computers, personal digital terminals, desktop computers, smart speakers, smart watches, and the like. When the terminal apparatus 101 is software, it can be installed in the various electronic apparatuses described above. It may also be implemented as single or multiple software or software modules. The embodiment of the application does not limit the specific type of the electronic device.
The server 102 may provide various services such as a server that performs intelligent analysis processing on all or part of image data, sound data, fingerprint data, and the like provided by the terminal device 101 in response to the processing results, and returns the processing results to the terminal device. The server may be hardware or software. The server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and can also be a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms and the like. The server may be composed of a single or multiple software modules, and the embodiments of the present application do not impose any limitation on the specific type of server. The server and the terminal may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
The intelligent analysis processing method can be realized based on an artificial intelligent algorithm. Artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a machine controlled by a digital computer to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use the knowledge to obtain optimal results. In other words, artificial intelligence is an integrated technology of computer science that attempts to understand the essence of intelligence and to produce a new intelligent machine that can react in a similar way to human intelligence. Artificial intelligence, i.e. research on design principles and implementation methods of various intelligent machines, enables the machines to have functions of sensing, reasoning and decision. The artificial intelligence technology is a comprehensive subject, and relates to the technology with wide fields, namely the technology with a hardware level and the technology with a software level. Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
Computer Vision (CV) is a science of studying how to "look" a machine, and more specifically, to replace human eyes with a camera and a Computer to perform machine Vision such as recognition, tracking and measurement on a target, and further perform graphic processing to make the Computer process into an image more suitable for human eyes to observe or transmit to an instrument to detect. As a scientific discipline, computer vision research-related theory and technology has attempted to build artificial intelligence systems that can acquire information from images or multidimensional data. Computer vision techniques typically include image processing, image recognition, image semantic understanding, image retrieval, OCR, video processing, video semantic understanding, video content/behavior recognition, three-dimensional object reconstruction, 3D techniques, virtual reality, augmented reality, synchronous positioning, and map construction, among others, as well as common biometric recognition techniques such as face recognition, fingerprint recognition, and others.
In the related art, consumer clients typically have multiple modes of operation, such as certain clients, setting teenager modes of operation for minors. The teenager operation mode means that part of the use authority of the consumption client is limited, or the part of the use authority can be normally used only after the user correctly inputs the password. The use rights of the former are always prohibited in teenager operation mode and cannot be dynamically changed. The latter restricts the use environment of the user based on the password, and if the password is known by the executing user of the consuming client, the operation mode of the password setting is similar to a dummy, and the executing user cannot be effectively prevented from consuming at the consuming client. In particular, in various application scenarios involving consumption behavior, the transitional consumption behavior of the executing user of the consumption client cannot be prevented by means of password protection. Therefore, the present application proposes an identification method to effectively solve the above-mentioned problems.
The identity recognition method provided by the embodiment of the application can be generally executed by the identity recognition device, and correspondingly the identity recognition device can be arranged in a server, terminal equipment or a server and the terminal equipment in a cooperative mode.
Referring to fig. 2, fig. 2 is a flow chart illustrating a user identification method according to an embodiment of the present application. As shown in fig. 2, the method includes:
step 201, receiving a consumption operation in an operation interface of a consumption client;
and 202, displaying an identification message in the operation interface. The identification information is used for prompting the user performing the identification on the consumption operation based on the consumption value corresponding to the consumption operation and the historical consumption amount related to the binding user of the consumption client. The historical consumption is calculated based on historical consumption data within a preset time range provided by a target paymate associated with the bound user.
The target paymate refers to one or more paymate(s) determined from at least one paymate associated with a bound user.
In step 203, a mode switch message is displayed in the operation interface in response to the recognition operation for the identity recognition message input. The mode switching message is used for prompting the user to switch the consumption client from the normal consumption mode to the authority control mode when the identity of the executing user is inconsistent with the identity of the binding user. The permission control mode is used for temporarily prohibiting the execution of the consumer operation of the user.
In the above steps, the consuming client means an application program that performs a certain consuming function, which is pre-installed in the terminal device. Such as a live video viewer client for viewing live video, a microblog client for information interaction, a client for viewing news information, etc. The operation interfaces of the clients refer to media for providing man-machine interaction and realizing interaction logic. For example, in a live video scene, an operation interface displayed in a live video viewer client includes at least a main interface to play live video, and a plurality of icons displayed in the main interface. Here, the icons may include, for example, virtual item icons, which may also be referred to as bonus icons, for which a user inputs relevant operation instructions to implement a consumption behavior. Or in the microblog or information interaction platform, the data interaction client comprises an operation interface for displaying information, and icons and the like of the appreciation function are also included in the operation interface.
In these operation interfaces, a consumption operation of an icon input related to the consumption operation is detected to realize the consumption behavior. Taking the example that the icon is a virtual object icon contained in the video live broadcast interface, the virtual object icon corresponds to a specific consumption value; when the user clicks the virtual object icon in the operation interface and determines to execute the consumption operation, the consumption behavior that the user rewards the anchor through the virtual object icon can be realized. For another example, icons corresponding to the rewarding function are used in the data interaction client, and the user clicks the icon of the rewarding function in the operation interface, so that the consumption behavior of rewarding the blogger can be realized.
The operation for the icon may be a click operation, a slide operation, or the like for the icon input, and these operations may be operations corresponding to gesture actions. These operations may also be voice control operations for icon inputs.
The consumption value corresponding to the consumption operation refers to a consumption value acquired in the consumption client for the consumption operation. For example, in a live video scene, an operator interface displayed on a live video viewer client may include one or more virtual item icons, each of which is pre-set with a certain amount of consumption value. And (3) inputting one click operation for each virtual article icon, and deducting the consumption value corresponding to the virtual article icon from the current account corresponding to the live video audience client. And (3) aiming at the multi-click operation input by each virtual article icon, deducting the accumulated times from the current account corresponding to the live audience client and multiplying the accumulated times by the consumption value corresponding to each virtual article icon.
The above binding user refers to a user who creates a consuming client, which has legal consuming rights in the process of using the consuming client. The user creates an account number of the consuming client by inputting user information. For example, a user creates an account for a consuming client by entering a cell phone number. The user information can also be WeChat account numbers, identity card information and the like.
The executing user is a user whose pointer inputs a consuming operation to the consuming client. It may be the binding user himself or the relatives of the binding user, such as the monitored object of the binding user, minors, etc.
The historical consumption amount related to the bound user of the consumption client is calculated based on historical consumption data within a preset time range provided by a target payment platform associated with the bound user. Wherein the target paymate refers to one or more paymate determined from at least one paymate associated with the bound user.
Paymate is a platform that provides a source of resources to a consuming client. The paymate may be, for example, a WeChat paymate, a Payment device paymate, unionpay card paymate, QQ paymate, and the like, as well as other paymate.
When the consumption operation input by the user aiming at the consumption client is executed, whether the user is identified is judged by acquiring the accumulated consumption amount of the consumption client and the historical consumption amount in a preset time range provided by a target payment platform associated with the bound user. For example, the target paymate may be determined according to the number of times the bound user uses each paymate, or the bound paymate of the consuming client may be directly determined as the target paymate, or the target paymate may be determined according to artificial intelligence analysis of the payment frequency of the bound user on each paymate.
The target paymate may be one, two or more of a plurality of paymate.
After the historical consumption amount provided by the target payment platform is obtained, the accumulated consumption amount of the consumption client side is compared with the historical consumption amount to trigger the identification of the user executing the consumption operation. And then controlling the operation mode of the consumption client according to the identification result. And when the identity of the executing user is inconsistent with the identity of the binding user, controlling the consumption client to switch from the normal consumption mode to the authority control mode. The normal consumption mode means that the consumption operation of the executing user or the binding user is not limited at all. The permission control mode is used for temporarily prohibiting the execution of the consumer operation of the user. As shown in fig. 7, a prohibition range prompt message is displayed in the operation interface, and the content of the consumption operation area in the operation interface temporarily shields the area through the cover layer, or the display color of the icon displayed in the area is modified to gray to prompt the user to prohibit the operation on the gray icon.
In the rights control mode, any user's consuming operations may be temporarily prohibited by freezing the time. The freezing time refers to a time range in which the user's consumption operation is temporarily frozen. The freeze time may be determined based on the historical consumption of the binding user. For example, if the frequency of the binding user using the WeChat payment platform is highest, the time of the current consumption operation is taken as a time starting point, the historical consumption amount of the WeChat payment platform within 10 days before the time starting point is obtained, the historical consumption amount of the WeChat payment platform in the first 1 month is calculated, the ratio of the historical consumption amount of the first 10 days to the historical consumption amount of the first 1 month is calculated, and the current consumption time length of the consumption client is multiplied, so that the freezing time is obtained.
Compared with the related art, the method and the device can trigger the identity recognition of the executing user by acquiring the historical consumption data of the target payment platform and the accumulated consumption value of the consumption client, and can effectively prevent the transitional consumption behavior of the user.
The following further describes embodiments of the present application with reference to fig. 3-7, taking the scenario in which a user encounters a balance shortage during operation as an example. Referring to fig. 3, fig. 3 is a flow chart illustrating a user identification method according to an embodiment of the present application. As shown in fig. 3, the method includes:
step 301, receiving a consumption operation in an operation interface of a consumption client;
step 302, in response to the consumption operation, displaying a balance prompt message in the operation interface, where the balance prompt message is used to indicate that a consumption value corresponding to the consumption operation is greater than an account balance of the consumption client.
Step 303, receiving recharging operation input for the balance prompt message in the operation interface;
step 304, in response to the recharging operation, displaying an identification prompt message in the operation interface, where the identification prompt message is used to prompt the consumption client to accumulate consumption equal to or greater than the historical consumption of the target payment platform, and identify the user executing the consuming operation.
In step 305, in response to the recharging operation, a first recharging prompting message is displayed in the operation interface, where the first recharging prompting message is used to prompt that the accumulated consumption of the consumption client is smaller than the historical consumption of the target payment platform and enters the recharging interface, and the maximum recharging amount is displayed in the recharging interface. The maximum recharge amount is calculated based on the historical consumption amount of the target paymate and the accumulated consumption amount of the consumption client.
Step 306, receiving an identification operation aiming at the identification prompt message input in the operation interface;
in step 307, in response to the identification operation, a mode switching message is displayed in the operation interface, where the mode switching message is used to prompt that the identity of the executing user is inconsistent with the identity of the binding user, and control the consuming client to switch from the normal consuming mode to the permission control mode, where the permission control mode is used to temporarily prohibit the consuming operation of the executing user.
Step 308, in response to the identification operation, displaying a second recharging prompting message in the operation interface, where the second recharging prompting message is used to prompt the executing user to execute the recharging operation when the identity of the executing user is consistent with the identity of the binding user.
In the above step, the user input consuming operation for the virtual item icon in the consuming client is performed, for example, clicking the virtual item icon. After the consumption client detects the consumption operation, the accumulated consumption amount of the consumption client is calculated based on the consumption value corresponding to the virtual object icon and the historical consumption value of the consumption client. Historical consumption values refer to consumption values that are generated within a statistical period preceding a time node at which a consumption operation was generated. For example, the statistical period may be a time period obtained by taking the time node as the end time, searching the first day of the current natural month to which the time node belongs as the start time.
For example, executing the consumption operation input by the user for the virtual object icon of the consumption client, the consumption client sends the consumption value corresponding to the consumption operation to the consumption server corresponding to the consumption client to calculate the accumulated consumption amount, and the accumulated consumption amount can also be calculated locally at the consumption client.
When the consumption client receives the consumption operation behavior input by the user, a consumption request message is sent to a target payment platform associated with the bound user, the historical consumption amount returned by the target payment platform is received, whether the consumption value corresponding to the consumption operation is larger than the account balance corresponding to the consumption client is judged, and if the consumption value is larger than the account balance corresponding to the consumption client, the consumption operation is forbidden. If not, then executing the consumption operation, wherein the consumption operation is limited by the historical consumption amount. For example, if the consumption value corresponding to the consumption operation is smaller than or equal to the account balance, and the accumulated consumption amount of the consumption client is larger than or equal to the historical consumption amount returned by the target payment platform, the current consumption operation is forbidden. And if the consumption value corresponding to the consumption operation is smaller than or equal to the account balance, and the accumulated consumption amount of the consumption client is larger than or equal to the historical consumption amount returned by the target payment platform, the current consumption operation is allowed.
When the accumulated consumption is greater than or equal to the historical consumption, prompting the user to identify the executing user in an operation interface of the consumption client. The prompting mode can be a popup window mode to float on the upper layer of the main interface. The prompt content prompts the current user that the user needs to identify before continuing to consume.
The historical consumption amount may be stored at a server of the paymate, such as a cloud server, among others. The monthly consumption of the paymate may also be linked up to the block by blockchain technology through the paymate's server. When the server of the paymate receives the consumption request message, the month consumption amount of continuous N months stored in the block is read. N may be a natural number.
For example, a historical consumption record generation block generated by a plurality of different payment clients pre-installed in a user terminal device is uplink, and when a consumption client sends a consumption request message to a consumption server, the consumption server requests historical consumption data of a target payment platform associated with a bound user of the consumption client to a blockchain network. The consumption server compares the historical consumption data returned by the target payment platform with the accumulated consumption of the consumption client according to the historical consumption data returned by the target payment platform, or calculates the average historical consumption of the bound user according to the historical consumption data returned by the target payment platform, and compares the accumulated consumption with the average historical consumption.
In the embodiment of the application, the historical consumption data of the binding user on each payment platform is stored in a block chain mode, so that the decentralised data sharing can be realized, and all consumption data are ensured to be real, effective and untampereable.
As shown in fig. 4 (a), a user input click operation for a viewing icon in the live interface is performed in the live interface as a consumption operation, and in response to the consumption operation, the live interface as shown in fig. 4 (b) is entered. And displaying an operation area of the virtual object icon in the live broadcast interface. Suppose that the user inputs a gift operation instruction aiming at the soap icon, a prompt message is popped up in a popup window form in the live broadcast interface, and the prompt message is 'warm prompt that the appreciation amount of your month exceeds 20% of the month average consumption record', if the consumption is to be continued, the face identification identity verification is carried out. Or the content of the prompt message is 'warm prompt that the appreciation amount of the month exceeds 20% of the month-average consumption record of the payment facilitator', if the consumption is to be continued, the face identification authentication is carried out. Or the prompt message content display calculates the historical consumption based on a plurality of paymate. I.e. the accumulated consumption of the consumption client is larger than the historical consumption of the binding user, or the accumulated consumption is larger than the threshold corresponding to the historical consumption of the binding user. The threshold value may be 10%,20%,30%, or 50%, and the value of the threshold value is not particularly limited in this application. The settings may specifically need to be adjusted.
And inputting a confirmation instruction in the execution user's verification removing area aiming at the prompt in the popup window, and responding to the confirmation instruction, displaying an area for acquiring the biological characteristic data of the execution user using the consumption client in a live broadcast interface, wherein the area can acquire the human face characteristic data of the execution user in a human face recognition mode as shown in fig. 5. Face recognition is a biological recognition technology for carrying out identity recognition based on facial feature information of people. The image or video stream containing the face is collected by a camera or a camera installed in the electronic device, the face is automatically detected and tracked in the image, and a series of related technologies of face recognition on the detected face can also be called as face recognition and face recognition.
In the popup window, the prompt content "please read the following text from the screen for authentication, and record the screen for 5s" is displayed, and the text content "i am the principal" is highlighted by adding a large-scale font under the prompt content ". And a progress bar is arranged around the image acquisition area in a surrounding mode and used for displaying the video recording progress, and the screen recording time length is displayed below the image acquisition area.
After the video data of the current user using the client is collected, different biological characteristic parameters of the current user can be extracted from the video data, so that the accuracy of user identification is improved. For example, when the biometric data of the current user is collected as facial feature data, the facial feature data may be obtained by:
And controlling to start the camera, and prompting the current user to input the relevant video clips according to the requirements in a popup window in the operation interface. For example, as shown in fig. 5, a face video of length 5s is recorded. And carrying out framing processing on the acquired face video to obtain a plurality of image frames, and extracting a face image area from each image frame. The extraction of the facial image area can be performed by, for example, adopting a cascade classifier which is built by training an Adaboost face detection algorithm based on Haar features, classifying each area block contained in each image frame, and the classification result output by the cascade classifier is 1, which indicates that the facial image area is detected, or can be also called as the face image area. The classification result is 0, which indicates that no face image area is detected. By adopting the Adaboost face detection algorithm based on Haar characteristics, the face image area can be searched by continuously adjusting the position and the proportion of the window in the same image frame.
Further, after the face image area is detected, feature extraction is performed on the face image area, and face features corresponding to the expression and gesture actions of the current user are obtained. Feature extraction refers to the characterization of face information by a number, which is the feature we want to extract. Common facial features can be divided into two categories, one category being geometric features and the other category being characterization features. Geometric features refer to geometric relationships between facial features such as eyes, nose, and mouth, such as distance, area, and angle. The characterization features are global or local features extracted from the face image area by some algorithms by using gray information of the face image. For example, a common feature extraction algorithm, such as a local binary pattern algorithm (english full name Local Binary Patterns, abbreviated LBP).
Dividing a face image area into a plurality of subareas; in the neighborhood of the pixel 640x960 in each sub-region, the central value of the neighborhood is used as a threshold value to thresholde the sub-region, and then the facial features obtained in the last step are input into a neural network to obtain 128 feature measurement values, and the 128 feature measurement values are stored to be used as feature vectors corresponding to the facial features. The feature vector is a 128-dimensional feature, and the neural network can be trained by using a Triplet Loss function (English is called Triplet Loss).
The client sends the extracted facial features of the current user to the server, and the server performs proofreading and similarity matching according to the facial features of the current user acquired by the client and the facial features of the binding user stored in advance. The euclidean distance between the two facial features may be calculated, for example, by calculating the euclidean distance between 128 dimensional features to which the facial feature of the current user and the facial feature of the bound user respectively correspond, for example, by defining the following formula:
comparing the Euclidean distance obtained by calculation with a preset threshold value, and if the Euclidean distance is larger than or equal to the preset threshold value, considering the current user and the binding user as the same person, otherwise, considering the current user and the binding user as not the same person.
And when the identity of the current user is inconsistent with the identity of the binding user corresponding to the current account, the current user is not allowed to execute data processing corresponding to the operation aiming at the current account of the client. When the authentication fails, a popup window failing to authenticate is displayed in an operation interface to the current user, the current user is not allowed to recharge and consume in the month, and the authentication can be performed after the user is authenticated again.
That is, identifying the identity of the current user based on the biometric data of the current user and the pre-stored biometric data of the bound user of the current account may include:
acquiring prestored biological characteristic data of a binding user based on a current account;
comparing the biological characteristic data of the current user with the biological characteristic data of the binding user;
when the comparison results are consistent, the identity of the current user is consistent with the identity of the binding user;
and when the comparison result is inconsistent, the identity of the current user is inconsistent with the identity of the binding user.
And inputting a confirmation instruction in the execution user's verification removal' area aiming at the prompt in the popup window, and responding to the confirmation instruction, displaying an area for collecting the biological characteristic data of the execution user using the consumption client in a live broadcast interface, wherein the fingerprint data of the execution user can be obtained in a fingerprint identification mode as shown in fig. 6.
According to the embodiment of the application, the identity of the executing user is identified by comparing the biological characteristic data of the executing user with the biological characteristic data of the prestored binding user, so that the transitional consumption behavior of the executing user can be effectively prevented.
The user identification method provided in the embodiment of the present application is described in connection with fig. 8-10 by taking the example that the accumulated consumption value of the consumption client reaches the threshold value of the historical consumption value of one or more paytables and triggers the prompt of identification at the operation interface. Referring to fig. 8, fig. 8 is a flow chart illustrating a user identification method according to an embodiment of the present application. As shown in fig. 8, the method includes:
in step 601, a consuming operation is received within an operation interface of a consuming client.
Step 602, responding to a consumption operation, and sending a time node corresponding to the consumption operation;
step 603, receiving an accumulated consumption amount of the consumption client acquired based on the time node; the accumulated consumption amount is accumulated and summed based on the consumption value corresponding to the consumption operation and the historical consumption operation of the consumption client.
Step 604, sending a consumption request message to a target paymate, wherein the target paymate is determined from at least one paymate based on the frequency of payment;
Step 605, receiving a historical consumption amount returned by the target paymate in response to the consumption request message. The historical consumption is calculated based on the historical consumption data in a preset time range determined by the time node;
step 606, displaying an identification prompt message in the operation interface, where the identification prompt message is used to prompt the accumulated consumption of the consumption client to be greater than or equal to the historical consumption of the target payment platform, and identify the user executing the consumption operation.
In step 607, an identification operation for the identification hint message input is received at the operation interface.
In response to the identifying operation, a collection operation sub-interface for prompting collection of biometric data of the executing user using the consuming client is displayed in the operation interface, step 608.
Step 609, receiving an input acquisition instruction in an acquisition operation sub-interface;
step 610, in response to the collection instruction, displaying a state of collecting biometric data of the executing user using the consuming client in the collection operation sub-interface;
step 611, after the acquisition is finished, displaying an identification failure message in the operation interface, where the identification failure message is used to indicate that the identity of the executing user is inconsistent with the identity of the binding user;
Step 612, receiving a re-identification operation for the identification failure message input;
step 613, in response to the re-recognition operation, displaying a re-recognition prompt message in the operation interface, where the re-recognition prompt message is used to prompt the user to receive the consumption operation area for executing the consumption operation of the user, which is determined based on the number of re-recognition operations;
step 614, after the acquisition is finished, displaying an identification success message in the operation interface, wherein the identification success message is used for enabling the identity of the current user to be consistent with the identity of the binding user corresponding to the current account;
step 615, receiving a consumption instruction input for an identification success message;
in response to the consume instruction, a consume operation is performed, step 616.
In the above steps, the consumption operation input by the virtual object icon is received in the operation interface of the consumption client, the consumption value corresponding to the virtual object icon is sent to the consumption server, the consumption server obtains the historical consumption operation generated by the consumption client in the natural month, the historical consumption amount of the consumption client is calculated based on the historical consumption operation, and the consumption value and the historical consumption amount of the consumption client are subjected to cumulative calculation to obtain the cumulative consumption amount of the consumption client.
When a consumption operation request message is sent by a consumption client, the consumption server acquires one or more associated payment accounts of a bound user based on account information of the consumption client, and requests historical payment data from a payment platform corresponding to the payment account through the payment account. The historical consumption of the bound user is calculated based on historical payment data returned by the one or more paymate. For example
One or more paymate of the plurality of paymate is selected as the target paymate, e.g., based on the paymate's frequency of payment. The payment frequency refers to the number of payments per paymate. For example, the Payment platform generates 10 payment data within 1 month, each of which has an amount { A } 1 ,A 2 ,……,A 10 The payment frequency may be 10. For another example, the Payment platform generates 10 payment data within 1 month, each payment data having an amount { A } 1 ,A 2 ,……,A 10 Generating 5 payment data within 1 month by the WeChat payment platform, wherein the sum of each payment data is { B } 1 ,B 2 ,……,B 5 The payment frequency may be 10 for paymate and 5 for WeChat paymate.
And comparing the payment times of the payment platform with the payment threshold times to determine a target payment platform. The target paymate is selected by adjusting the threshold number of payments, for example, the threshold number of payments is 1, and the paymate can be used as the target paymate as long as the payment action occurs. For example, the payment threshold number is greater than 5, then the paymate satisfying the payment number greater than 5 is the target paymate.
And calculating the historical consumption amount corresponding to the target payment platform according to the historical consumption data of the target payment platform in the preset time range. The preset time range may be, for example, 3 months.
The consumption server compares the historical consumption amount with the accumulated consumption amount of the consumption client; and if the accumulated consumption is greater than or equal to the threshold value of the historical consumption, sending a prompt message to the consumption client to prompt the identity recognition of the executing user using the client. The identification is, for example, face recognition, fingerprint recognition, voice recognition, pupil recognition, or the like.
After the consumer client receives the confirmation operation of executing the consent identification input by the user, the acquisition of video image data or fingerprint image acquisition is started to be executed in the operation interface.
If the face recognition is performed, the consumption client performs face feature extraction on the video image acquired at present, and sends the extracted face features to the consumption server, and the consumption server compares the face features of the user with the prestored face features of the binding user. In the process of performing the comparison operation at the consumption server, a popup window as shown in fig. 9 is displayed at the consumption client, and "in face recognition verification" is displayed in the popup window, and the processing time is increased in "verification". And when the comparison is consistent, the identity of the current user is consistent with the identity of the binding user, a prompt message is sent to the client side, the prompt message is used for prompting the identity information to be consistent, and the appreciation operation is continuously executed, as shown in fig. 10 (a). Otherwise, a prompt message is also sent to the client for prompting that the identity information is inconsistent, as shown in fig. 10 (b). And accumulating the times of user identity recognition failure to obtain accumulated times, and locking the rewarding operation function of the consumption client in the freezing time if the accumulated times are greater than or equal to an accumulated threshold value. If the accumulated number of times is less than the accumulated threshold, the prompt message is continuously returned so that the current user tries identity recognition again.
According to the embodiment of the application, the authentication is triggered by carrying out accumulated judgment on the operation of the user on the icon, so that the transitional consumption behavior of the current user is effectively prevented.
The following describes in detail the identity recognition method proposed in the embodiment of the present application with reference to fig. 11, taking a user performing a viewing operation on a live platform as an example. Referring to the drawings, fig. 11 is a schematic diagram illustrating an interaction process of the identification method provided in the embodiment of the present application.
When the underage user A logs in the live audience client to watch the live video by using the account number of the adult user B, the underage user A can input an operation instruction aiming at a gift icon displayed in the live interface, wherein the operation instruction is used for designating a gift and is ready for executing a viewing operation.
And if the live broadcast audience client detects that the amount corresponding to the gift icon appointed by the user is larger than the account balance, the live broadcast audience client pops up a prompt window, and first prompt information is displayed in the prompt window. The first prompting message is used for prompting that the account balance of the user is insufficient and requesting recharging. The first prompting message may be a text message or a voice message.
When the user selects to continue recharging operation, and the recharging amount is input in the recharging interface, the live broadcast audience client sends the recharging amount to the server, and the server calculates the accumulated amount corresponding to the recharging amount and the current month historical rewarding operation corresponding to the live broadcast audience client, so that the accumulated consumption of the live broadcast audience client is obtained.
Or, the user inputs the gift icon in the live broadcast interface to give the operation, the consumption amount corresponding to the gift icon is directly sent to the server, the consumption amount corresponding to the gift icon selected by the current gift operation is calculated in an accumulated mode, and the accumulated sum is carried out on the consumption amount corresponding to the historical reward operation, so that the accumulated consumption amount of the client of the live broadcast audience is obtained.
The server sends a consumption request message to the paymate based on user information of the live audience client. For example, a consumption request message is sent to all paymate used by the binding user, 3 historical consumption data are obtained from all paymate, and the historical consumption corresponding to each paymate is calculated according to a month counting period, and the historical consumption represents the month average consumption generated by all paymate.
And the server compares the accumulated consumption of the live audience client with the threshold value of the average monthly consumption generated by all payment platforms corresponding to the binding user. For example, the threshold may be set to 20%.
If the accumulated consumption is greater than or equal to the threshold value of the average monthly consumption, the server sends a second prompt message to the client of the live audience, the prompt interface is popped up in the live interface, and the second prompt message is displayed in the prompt interface. The second prompting message is used for prompting the user that the accumulated consumption amount is larger than the average consumption amount in the month. For example, the content of the second hint message may be "20% of the record that the appreciation amount of you've this month has been consumed more than one month, if consumption is continued, please perform face recognition authentication first.
The user may input an operation instruction for "go-verify" in the prompt interface under the direction of the second prompt message, where the operation instruction is used to determine to choose to enter the face recognition verification interface to perform the verification operation. As shown in the interface schematic of fig. 4 (b).
In the face recognition verification interface, the user can perform face recognition according to the third prompt message displayed in the face recognition verification interface displayed by the live audience client. The third prompting message is used for prompting the user to execute the operation steps of face recognition. For example, the content of the third prompting message is "please read the following text and record for 5s", and the user can read the displayed text against the opened camera according to the content and continue recording for 5s.
And then, the live broadcast audience client controls the camera to be in an on state, and sends video image data which is acquired by the camera and contains the face characteristics of the current user to the server. The live broadcast audience client carries out framing processing on the acquired video image data to obtain a plurality of image frames, and carries out face image area detection on each image frame to obtain a face image area. And extracting the face features aiming at the face image area to obtain the face features, wherein the face features are expressed as 128-dimensional data values. And sending the face characteristics to a server. The acquired video image data can also be directly sent to a server, and the server can finish the processing operations of face detection, extraction, identification and the like.
The server searches the pre-stored face image data for identity verification according to the account information, and compares the face image data for identity verification with the received video image data containing the face characteristics of the current user. And comparing the Euclidean distance value obtained through calculation with a preset distance threshold value, and if the Euclidean distance value is greater than or equal to the distance threshold value, indicating that the comparison result is consistent. If the comparison results are consistent, the current user using the live audience client is consistent with the binding user corresponding to the account of the live audience client. The server sends a fourth prompting message to the live audience client. And popping up a prompt interface on the live audience client, and displaying a fourth prompt message in the prompt interface. The fourth prompting message is used for prompting that the authentication result is that the authentication is successful. The user may further input an operation instruction for the fourth hint message to continue to perform the refill operation and the subsequent bonus operation.
And if the calculated Euclidean distance is smaller than the distance threshold value, the comparison result is inconsistent. The binding user that indicates that the current user using the live audience client corresponds to the account of the live audience client is inconsistent. The server sends a fifth prompting message to the live audience client. And popping up a prompt interface on the live audience client, and displaying a fifth prompt message in the prompt interface. The fifth prompting message is used for prompting that the authentication result is authentication failure. The user may input an operation instruction for the fifth hint message to reinitiate authentication. However, after the verification of the preset times, if the verification result is still authentication failure, prompting the execution prohibition of the consumption operation range of the user in the operation interface, and displaying the operation area corresponding to the frozen consumption operation in the operation interface. For example, an operation freeze may be indicated by a gray icon within the operation interface. When the user clicks the operation, the area is prompted to prohibit use in the freezing time range. For example, an operation region of the bonus function is locked. The preset number of times is, for example, 3 times.
And if the amount corresponding to the gift icon designated by the user is greater than or equal to the account balance and the accumulated consumption is smaller than the threshold value of the average monthly consumption, continuing to enter a recharging interface, displaying the maximum recharging amount in the recharging interface on the recharging interface, wherein the maximum recharging amount is calculated based on the historical consumption amount and the accumulated consumption amount of the target payment platform.
And displaying an operation area corresponding to the frozen consumption operation in the operation interface when the amount of money corresponding to the gift icon appointed by the user is smaller than or equal to the account balance and the accumulated consumption is larger than or equal to the threshold value of the average consumption in month.
And continuing the consumption operation when the amount corresponding to the gift icon appointed by the user is smaller than or equal to the account balance and the accumulated consumption amount is smaller than the threshold value of the average monthly consumption amount. Allowing the execution of a viewing operation.
According to the embodiment of the application, the consumption behavior of the user is controlled by acquiring the historical consumption of the payment platform, so that the transitional consumption of the executing user can be effectively prevented, and the economic potential safety hazard is eliminated.
It should be noted that although the operations of the disclosed methods are depicted in the drawings in a particular order, this does not require or imply that the operations must be performed in that particular order or that all illustrated operations be performed in order to achieve desirable results. Rather, the steps depicted in the flowcharts may change the order of execution. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform.
Referring to fig. 12, fig. 12 is an exemplary block diagram illustrating a user identification device according to an embodiment of the present application. As shown in fig. 12, the apparatus includes:
an operation receiving unit 801 for receiving a consumption operation in an operation interface of a consumption client;
and the identification unit 802 is configured to display an identification message in the operation interface in response to the consumption operation. The identification message is used for prompting the user performing the identification of the consumption operation based on the consumption value corresponding to the consumption operation and the historical consumption amount related to the bound user of the consumption client, and the historical consumption amount is calculated based on the historical consumption data in a preset time range provided by a target payment platform related to the bound user. The target paymate is determined from at least one paymate associated with the bound user.
And a right control unit 803 for displaying a mode switching message in the operation interface in response to the recognition operation for the identification message input. The mode switching message is used for prompting the user to switch the consumption client from the normal consumption mode to the authority control mode when the identity of the executing user is inconsistent with the identity of the binding user. The permission control mode is used for temporarily prohibiting the execution of the consumer operation of the user.
Optionally, the identity recognition unit is further configured to:
responding to the consumption operation, displaying a balance prompt message in an operation interface, wherein the balance prompt message is used for indicating that a consumption value corresponding to the consumption operation is larger than the account balance of a consumption client;
receiving recharging operation aiming at balance prompt message input in an operation interface;
and responding to the recharging operation, displaying an identification prompt message in an operation interface, wherein the identification prompt message is used for prompting the accumulated consumption amount of the consumption client to be more than or equal to the historical consumption amount of the target payment platform, and carrying out identification on the user executing the consuming operation.
Optionally, the identity recognition unit is further configured to:
and responding to the recharging operation, and displaying a recharging prompt message in the operation interface. The recharging prompting message is used for prompting that the accumulated consumption of the consumption client side is smaller than the historical consumption of the target payment platform and enters a recharging interface, the maximum recharging amount is displayed in the recharging interface, and the maximum recharging amount is calculated based on the historical consumption of the target payment platform and the accumulated consumption of the consumption client side.
Optionally, the identity recognition unit is further configured to
And responding to the consumption operation, displaying an identification prompt message in an operation interface, wherein the identification prompt message is used for prompting the accumulated consumption amount of the consumption client to be larger than or equal to the historical consumption amount of the target payment platform, and carrying out identification on an executing user of the consumption operation, and the accumulated consumption amount is obtained by accumulating and summing up the consumption value corresponding to the consumption operation and the historical consumption operation of the consumption client.
The apparatus further comprises:
the time sending unit is used for responding to the consumption operation and sending a time node corresponding to the consumption operation;
the first receiving unit is used for receiving the accumulated consumption corresponding to the consumption client acquired based on the time node;
the sending unit is used for sending a consumption request message to the target payment platform;
the second receiving unit is used for receiving the historical consumption amount returned by the target payment platform in response to the consumption request message, wherein the historical consumption amount is calculated based on the historical consumption data in a preset time range determined by the time node;
and the message generation unit is used for generating an identification prompt message based on the accumulated consumption and the historical consumption.
The rights control unit is further configured to:
and displaying a forbidden range prompt message in the operation interface, wherein the forbidden range prompt message is used for prompting the forbidden consumption operation input in the consumption operation area.
The identity recognition unit is also used for:
responding to the identification operation input for the identification information, displaying an acquisition operation sub-interface in an operation interface, wherein the acquisition operation sub-interface is used for prompting the acquisition of the biological characteristic data of an executing user using a consumption client;
responding to the receiving of the acquisition instruction in the acquisition operation sub-interface, and displaying the state of acquiring the biological characteristic data of the executing user using the consumption client in the acquisition operation sub-interface;
After the acquisition is finished, displaying an identification result in an operation interface, wherein the identification result is obtained by comparing prestored biological characteristic data of the binding user and biological characteristic data of the executing user, which are obtained based on user information of the binding user.
The identity recognition unit is also used for:
displaying an identity recognition failure message on an operation interface, wherein the identity recognition failure message is used for indicating that the identity of an executing user is inconsistent with the identity of a binding user;
receiving re-identification operation aiming at the input of the identification failure message in the operation interface;
and in response to the re-recognition operation, displaying a re-recognition prompt message in the operation interface, wherein the re-recognition prompt message is used for prompting the consumption operation which is determined based on the number of the re-recognition operation and is forbidden to be input in the consumption operation area.
It should be understood that the units or modules described in the apparatus correspond to the individual steps in the method described with reference to fig. 2. Thus, the operations and features described above for the method are equally applicable to the apparatus and the units contained therein, and are not described in detail herein. The device can be pre-implemented in a browser of the electronic equipment or other security applications, or can be loaded into the browser of the electronic equipment or the security applications thereof by means of downloading and the like. Corresponding units in the apparatus may cooperate with units in the electronic device to implement the solutions of the embodiments of the present application.
The division of the modules or units mentioned in the above detailed description is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Referring now to fig. 13, fig. 13 shows a schematic diagram of a computer system suitable for use in implementing an electronic device or server of an embodiment of the present application.
As shown in fig. 13, the computer system includes a Central Processing Unit (CPU) 901, which can execute various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 902 or a program loaded from a storage section 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data required for system operation are also stored. The CPU 901, ROM 902, and RAM 903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to the bus 904.
The following components are connected to the I/O interface 905: an input section 906 including a keyboard, a mouse, and the like; an output portion 907 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage portion 908 including a hard disk or the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The drive 910 is also connected to the I/O interface 905 as needed. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 910 so that a computer program read out therefrom is installed into the storage section 908 as needed.
In particular, according to embodiments of the present disclosure, the process described above with reference to flow diagrams of fig. 2 or 3 may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a machine-readable medium, the computer program comprising program code for performing the method shown in the flow diagrams. In such an embodiment, the computer program may be downloaded and installed from the network via the communication portion 909 and/or installed from the removable medium 911. When the computer program is executed by a Central Processing Unit (CPU) 901, the above-described functions defined in the system of the present application are performed.
It should be noted that the computer readable medium shown in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software, or may be implemented by hardware. The described units or modules may also be provided in a processor, for example, as: a processor includes an operation receiving unit, an identification unit, and a rights control unit. The names of these units or modules do not constitute limitations on the unit or module itself in some cases, and for example, the operation receiving unit may also be described as "a unit for receiving a consuming operation within an operation interface of a consuming client".
As another aspect, the present application also provides a computer-readable storage medium that may be included in the electronic device described in the above embodiments; or may be present alone without being incorporated into the electronic device. The computer-readable storage medium stores one or more programs that when executed by one or more processors perform the user identification method described herein.
The foregoing description is only of the preferred embodiments of the present application and is presented as a description of the principles of the technology being utilized. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this application is not limited to the specific combinations of features described above, but it is intended to cover other embodiments in which any combination of features described above or equivalents thereof is possible without departing from the spirit of the disclosure. Such as the above-described features and technical features having similar functions (but not limited to) disclosed in the present application are replaced with each other.

Claims (15)

1. A method for identifying a user, the method comprising:
receiving a consumption operation in an operation interface of a consumption client;
Responding to the consumption operation, and sending a time node corresponding to the consumption operation;
receiving accumulated consumption corresponding to the consumption client acquired based on the time node;
sending a consumption request message to a target payment platform; the target payment platform is a platform associated with a binding user of the consuming client;
receiving historical consumption amount returned by the target payment platform in response to the consumption request message, wherein the historical consumption amount is calculated based on historical consumption data in a preset time range determined by the time node;
generating an identification message based on the accumulated consumption and the historical consumption;
responding to the consumption operation, displaying an identification message in the operation interface, wherein the identification message is used for prompting the user performing the consumption operation to identify based on the consumption value corresponding to the consumption operation and the historical consumption amount related to the bound user of the consumption client;
and responding to the identification operation input for the identification information, displaying a mode switching message in the operation interface, wherein the mode switching message is used for prompting that the identity of the executing user is inconsistent with the identity of the binding user, controlling the consuming client to switch from a normal consuming mode to a permission control mode, and the permission control mode is used for temporarily prohibiting the consuming operation of the executing user.
2. The method of claim 1, wherein the identification message comprises an identification hint message, and wherein the displaying the identification message within the operation interface in response to the consuming operation further comprises:
responding to the consumption operation, and displaying a balance prompt message in the operation interface, wherein the balance prompt message is used for indicating that a consumption value corresponding to the consumption operation is larger than the account balance of the consumption client;
receiving recharging operation input for the balance prompt message in the operation interface;
and responding to the recharging operation, displaying an identification prompt message in the operation interface, wherein the identification prompt message is used for prompting the accumulated consumption amount of the consumption client to be greater than or equal to the historical consumption amount of the target payment platform, and carrying out identification on the user executing the consuming operation.
3. The method of claim 2, wherein the identification message comprises a first refill hint message, and wherein displaying the identification message within the operation interface in response to the consuming operation further comprises:
and responding to the recharging operation, displaying a first recharging prompting message in an operation interface, wherein the first recharging prompting message is used for prompting that the accumulated consumption of the consumption client side is smaller than the historical consumption of the target payment platform and enters a recharging interface, and displaying a maximum recharging amount in the recharging interface, wherein the maximum recharging amount is calculated based on the historical consumption of the target payment platform and the accumulated consumption of the consumption client side.
4. The method of claim 1, wherein the identification message comprises an identification hint message, and wherein the displaying the identification message within the operation interface in response to the consuming operation comprises:
and responding to the consumption operation, displaying an identification prompt message in the operation interface, wherein the identification prompt message is used for prompting the accumulated consumption amount of the consumption client to be more than or equal to the historical consumption amount of a target payment platform, and carrying out identification on an executing user of the consumption operation.
5. The method of claim 1, wherein the mode switch message comprises a forbidden range hint message, and wherein the displaying the mode switch message within the operation interface in response to the identification operation for the identification message input comprises:
and displaying the forbidden range prompt message in the operation interface, wherein the forbidden range prompt message is used for prompting the forbidden consumption operation input in the consumption operation area.
6. The method according to claim 1, characterized in that the method comprises:
responding to the identification operation input for the identification information, displaying an acquisition operation sub-interface in the operation interface, wherein the acquisition operation sub-interface is used for prompting to acquire the biological characteristic data of an executing user using a consumption client;
Responding to the receiving of the acquisition instruction in the acquisition operation sub-interface, and displaying the state of acquiring the biological characteristic data of the executing user using the consumption client in the acquisition operation sub-interface;
after the collection is finished, a recognition result is displayed in the operation interface, wherein the recognition result is obtained by comparing the prestored biological characteristic data of the binding user obtained based on the user information of the binding user with the biological characteristic data of the executing user.
7. The method of claim 6, wherein the identification result comprises an identification failure message, and displaying the identification result within the operation interface further comprises:
displaying an identity recognition failure message on the operation interface, wherein the identity recognition failure message is used for indicating that the identity of the executing user is inconsistent with the identity of the binding user;
receiving re-identification operation input aiming at the identification failure message in the operation interface;
and responding to the re-identification operation, displaying a re-identification prompt message in the operation interface, wherein the re-identification prompt message is used for prompting the consumption operation which is determined based on the number of re-identification operations and is forbidden to be input in the consumption operation area.
8. A user identification device, the device comprising:
the operation receiving unit is used for receiving the consumption operation in the operation interface of the consumption client;
the time sending unit is used for responding to the consumption operation and sending a time node corresponding to the consumption operation;
the first receiving unit is used for receiving the accumulated consumption corresponding to the consumption client acquired based on the time node;
the sending unit is used for sending a consumption request message to the target payment platform; the target payment platform is a platform associated with a binding user of the consuming client;
the second receiving unit is used for receiving the historical consumption amount returned by the target payment platform in response to the consumption request message, and the historical consumption amount is calculated based on the historical consumption data in a preset time range determined by the time node;
a message generation unit for generating an identification message based on the accumulated consumption and the historical consumption;
the identity recognition unit is used for responding to the consumption operation, displaying an identity recognition message in the operation interface, wherein the identity recognition message is used for prompting the user for executing the consumption operation to carry out identity recognition based on the consumption value corresponding to the consumption operation and the historical consumption amount related to the bound user of the consumption client;
And the permission control unit is used for responding to the identification operation input for the identification information, displaying a mode switching message in the operation interface, wherein the mode switching message is used for prompting the consumer client to switch from a normal consumption mode to a permission control mode when the identity of the executing user is inconsistent with the identity of the binding user, and the permission control mode is used for temporarily prohibiting the consumer operation of the executing user.
9. The apparatus of claim 8, wherein the identity recognition unit is further configured to:
responding to the consumption operation, displaying a balance prompt message in an operation interface, wherein the balance prompt message is used for indicating that a consumption value corresponding to the consumption operation is larger than the account balance of a consumption client;
receiving recharging operation aiming at balance prompt message input in an operation interface;
and responding to the recharging operation, displaying an identification prompt message in an operation interface, wherein the identification prompt message is used for prompting the accumulated consumption amount of the consumption client to be more than or equal to the historical consumption amount of the target payment platform, and carrying out identification on the user executing the consuming operation.
10. The apparatus of claim 9, wherein the identity recognition unit is further configured to:
And responding to recharging operation, displaying a recharging prompt message in an operation interface, wherein the recharging prompt message is used for prompting that the accumulated consumption of the consumption client side is smaller than the historical consumption of the target payment platform and enters the recharging interface, and displaying the maximum recharging amount in the recharging interface, wherein the maximum recharging amount is calculated based on the historical consumption of the target payment platform and the accumulated consumption of the consumption client side.
11. The apparatus of claim 8, wherein the identity recognition unit is further configured to:
and responding to the consumption operation, displaying an identification prompt message in an operation interface, wherein the identification prompt message is used for prompting the accumulated consumption amount of the consumption client to be larger than or equal to the historical consumption amount of the target payment platform, and carrying out identification on an executing user of the consumption operation, and the accumulated consumption amount is obtained by accumulating and summing up the consumption value corresponding to the consumption operation and the historical consumption operation of the consumption client.
12. The apparatus of claim 8, wherein the entitlement control unit is further to:
displaying a forbidden range prompt message in the operation interface, wherein the forbidden range prompt message is used for prompting the forbidden consumption operation input in the consumption operation area;
The identity recognition unit is also used for:
responding to the identification operation input for the identification information, displaying an acquisition operation sub-interface in an operation interface, wherein the acquisition operation sub-interface is used for prompting the acquisition of the biological characteristic data of an executing user using a consumption client;
responding to the receiving of the acquisition instruction in the acquisition operation sub-interface, and displaying the state of acquiring the biological characteristic data of the executing user using the consumption client in the acquisition operation sub-interface;
after the acquisition is finished, displaying an identification result in an operation interface, wherein the identification result is based on user information of the binding user;
and comparing the obtained prestored biological characteristic data of the binding user with the biological characteristic data of the executing user.
13. The apparatus of claim 12, wherein the identity recognition unit is further configured to:
displaying an identity recognition failure message on an operation interface, wherein the identity recognition failure message is used for indicating that the identity of an executing user is inconsistent with the identity of a binding user;
receiving re-identification operation aiming at the input of the identification failure message in the operation interface;
and in response to the re-recognition operation, displaying a re-recognition prompt message in the operation interface, wherein the re-recognition prompt message is used for prompting the consumption operation which is determined based on the number of the re-recognition operation and is forbidden to be input in the consumption operation area.
14. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-7 when the program is executed by the processor.
15. A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any of claims 1-7.
CN202010566870.0A 2020-06-19 2020-06-19 User identity recognition method, device, equipment and medium thereof Active CN111667275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010566870.0A CN111667275B (en) 2020-06-19 2020-06-19 User identity recognition method, device, equipment and medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010566870.0A CN111667275B (en) 2020-06-19 2020-06-19 User identity recognition method, device, equipment and medium thereof

Publications (2)

Publication Number Publication Date
CN111667275A CN111667275A (en) 2020-09-15
CN111667275B true CN111667275B (en) 2024-02-13

Family

ID=72388935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010566870.0A Active CN111667275B (en) 2020-06-19 2020-06-19 User identity recognition method, device, equipment and medium thereof

Country Status (1)

Country Link
CN (1) CN111667275B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507247B (en) * 2020-12-15 2022-09-23 重庆邮电大学 Cross-social network user alignment method fusing user state information
CN112801134A (en) * 2020-12-30 2021-05-14 杭州趣链科技有限公司 Gesture recognition model training and distributing method and device based on block chain and image
CN113114720B (en) * 2021-03-11 2022-10-21 支付宝(杭州)信息技术有限公司 Method, device, equipment and system for processing associated service data
CN113010861B (en) * 2021-03-16 2022-06-28 支付宝(杭州)信息技术有限公司 Identity verification method and system in financing transaction based on block chain
CN116883056A (en) * 2023-07-20 2023-10-13 广东星云开物科技股份有限公司 Target user identification method and device, electronic equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007125252A1 (en) * 2006-04-26 2007-11-08 France Telecom Method and system for managing an electronic payment
CN101785012A (en) * 2007-08-24 2010-07-21 本尼多尔公司 Transactional security over a network
CN102742242A (en) * 2009-08-07 2012-10-17 瑞典爱立信有限公司 Method and arrangements for control of consumption of content services
CN104077689A (en) * 2013-10-30 2014-10-01 腾讯科技(深圳)有限公司 Information verification method, relevant device and system
CN104966198A (en) * 2015-07-10 2015-10-07 苏州海博智能系统有限公司 Authorized consumption method and system
CN106504003A (en) * 2016-09-30 2017-03-15 维沃移动通信有限公司 A kind of method of mobile terminal payment mandate and mobile terminal
CN107742215A (en) * 2017-10-19 2018-02-27 佛山市章扬科技有限公司 One kind is based on finger print information method of payment
CN108062673A (en) * 2017-11-15 2018-05-22 平安科技(深圳)有限公司 Method of payment, terminal device and computer readable storage medium
CN109146496A (en) * 2018-08-28 2019-01-04 广东小天才科技有限公司 A kind of method of payment, device and wearable device
CN110322317A (en) * 2019-06-13 2019-10-11 腾讯科技(深圳)有限公司 A kind of transaction data processing method, device, electronic equipment and medium
CN110559666A (en) * 2019-09-19 2019-12-13 上海二三四五网络科技有限公司 Control method and control device for recharging game role
CN110585728A (en) * 2019-09-08 2019-12-20 北京智明星通科技股份有限公司 Method, system and mobile terminal for preventing mobile phone game from excessive recharge
CN110930160A (en) * 2019-11-27 2020-03-27 佛山市蠢材科技有限公司 Face recognition-based change management method and device and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090113315A1 (en) * 2007-10-26 2009-04-30 Yahoo! Inc. Multimedia Enhanced Instant Messaging Engine
CN106446670B (en) * 2016-10-26 2019-04-12 珠海格力电器股份有限公司 A kind of application management method, device and electronic equipment
CN109146494A (en) * 2018-08-06 2019-01-04 广东小天才科技有限公司 A kind of method of payment, system and wearable device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007125252A1 (en) * 2006-04-26 2007-11-08 France Telecom Method and system for managing an electronic payment
CN101785012A (en) * 2007-08-24 2010-07-21 本尼多尔公司 Transactional security over a network
CN102742242A (en) * 2009-08-07 2012-10-17 瑞典爱立信有限公司 Method and arrangements for control of consumption of content services
CN104077689A (en) * 2013-10-30 2014-10-01 腾讯科技(深圳)有限公司 Information verification method, relevant device and system
CN104966198A (en) * 2015-07-10 2015-10-07 苏州海博智能系统有限公司 Authorized consumption method and system
CN106504003A (en) * 2016-09-30 2017-03-15 维沃移动通信有限公司 A kind of method of mobile terminal payment mandate and mobile terminal
CN107742215A (en) * 2017-10-19 2018-02-27 佛山市章扬科技有限公司 One kind is based on finger print information method of payment
CN108062673A (en) * 2017-11-15 2018-05-22 平安科技(深圳)有限公司 Method of payment, terminal device and computer readable storage medium
CN109146496A (en) * 2018-08-28 2019-01-04 广东小天才科技有限公司 A kind of method of payment, device and wearable device
CN110322317A (en) * 2019-06-13 2019-10-11 腾讯科技(深圳)有限公司 A kind of transaction data processing method, device, electronic equipment and medium
CN110585728A (en) * 2019-09-08 2019-12-20 北京智明星通科技股份有限公司 Method, system and mobile terminal for preventing mobile phone game from excessive recharge
CN110559666A (en) * 2019-09-19 2019-12-13 上海二三四五网络科技有限公司 Control method and control device for recharging game role
CN110930160A (en) * 2019-11-27 2020-03-27 佛山市蠢材科技有限公司 Face recognition-based change management method and device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于用户业务量的在线计费方法研究;匡振国 等;微计算机信息;第26卷(第5-3期);17-19 *

Also Published As

Publication number Publication date
CN111667275A (en) 2020-09-15

Similar Documents

Publication Publication Date Title
CN111667275B (en) User identity recognition method, device, equipment and medium thereof
US20220172518A1 (en) Image recognition method and apparatus, computer-readable storage medium, and electronic device
Li et al. Unobservable re-authentication for smartphones.
CN114913565B (en) Face image detection method, model training method, device and storage medium
CN110222554A (en) Cheat recognition methods, device, electronic equipment and storage medium
US20220277596A1 (en) Face anti-spoofing recognition method and apparatus, device, and storage medium
CN110457699B (en) Method and device for mining stop words, electronic equipment and storage medium
CN110796089B (en) Method and apparatus for training face model
CN112052761A (en) Method and device for generating confrontation face image
CN111444826A (en) Video detection method and device, storage medium and computer equipment
CN111026967A (en) Method, device, equipment and medium for obtaining user interest tag
CN111783677B (en) Face recognition method, device, server and computer readable medium
CN116704581A (en) Face recognition method, device, equipment and storage medium
CN116798129A (en) Living body detection method and device, storage medium and electronic equipment
CN111405175B (en) Camera control method, device, computer equipment and storage medium
CN113518061B (en) Data transmission method, equipment, device, system and medium in face recognition
CN114444047A (en) Identity authentication method, device, equipment and storage medium based on virtual reality
US20210248615A1 (en) Method and system for digitally onboarding customers for providing one or more solutions in real-time
Osadchy et al. G en F ace: Improving Cyber Security Using Realistic Synthetic Face Generation
CN115222406A (en) Resource distribution method based on business service account and related equipment
CN114331791A (en) Model watermark generation method, model infringement identification method, model watermark generation device, model infringement identification device and computer equipment
CN113011919B (en) Method and device for identifying object of interest, recommendation method, medium and electronic equipment
WO2024104068A1 (en) Video detection method and apparatus, device, storage medium, and product
CN116977812A (en) Image data detection method, device, equipment and medium
CN115981755A (en) Face payment method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40028936

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant