CN111988274B - Account information verification method and device - Google Patents

Account information verification method and device Download PDF

Info

Publication number
CN111988274B
CN111988274B CN202010673231.4A CN202010673231A CN111988274B CN 111988274 B CN111988274 B CN 111988274B CN 202010673231 A CN202010673231 A CN 202010673231A CN 111988274 B CN111988274 B CN 111988274B
Authority
CN
China
Prior art keywords
account
instruction
information
obtaining
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010673231.4A
Other languages
Chinese (zh)
Other versions
CN111988274A (en
Inventor
高玮中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Handpal Information Technology Service Co ltd
Original Assignee
Shanghai Handpal Information Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Handpal Information Technology Service Co ltd filed Critical Shanghai Handpal Information Technology Service Co ltd
Priority to CN202010673231.4A priority Critical patent/CN111988274B/en
Publication of CN111988274A publication Critical patent/CN111988274A/en
Application granted granted Critical
Publication of CN111988274B publication Critical patent/CN111988274B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Social Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a verification method and a verification device of account information, which are applied to first electronic equipment, wherein the method comprises the following steps: obtaining a first operation of a first electronic device; judging whether the first operation belongs to a preset operation or not; obtaining first historical operation information of the first electronic equipment; judging whether the first operation is consistent with the first historical operation information or not; when the first instruction is consistent with the second instruction, obtaining a first instruction; obtaining a second operation according to the first operation, wherein the second operation is a confirmation operation of the second electronic equipment for the first operation; obtaining a first feedback result from the second electronic device; obtaining a second feedback result from the server, and obtaining a second instruction according to the first feedback result and the second feedback result; and obtaining a third instruction according to the first instruction and the second instruction, wherein the third instruction is used for verifying the legality of the operation after the first account is logged in, so that the effect of improving the account security is realized.

Description

Account information verification method and device
Technical Field
The invention relates to the field of information security processing, in particular to a method and a device for verifying account information.
Background
With the continuous development of science and technology and the rapid popularization of the internet, people use electronic equipment terminals to access various information systems through different account numbers, and the account numbers are possibly related to the production and management of enterprises or personal transaction money. Therefore, the security of the account is important, and especially, important account information related to enterprises is concerned, and how to ensure the security of the account is very important.
The existing background account number of the login enterprise usually has two verification modes: 1. and logging in the account through a complex password. 2. And carrying out account login verification through a decryption module.
However, in the process of implementing the technical solution of the invention in the embodiments of the present application, the inventor of the present application finds that the above technology has at least the following technical problems:
the above account login protection means is too single or too simple, and the security of the account cannot be effectively guaranteed. Once the background account is stolen by a person, immeasurable loss is brought to related workers and even enterprises.
Disclosure of Invention
By providing the method and the device for verifying the account information, the embodiments of the application solve the problems that the account protection means is simple and single and cannot effectively protect the account security in the prior art, and realize the technical effect of improving the account information security.
The embodiment of the application provides a verification method of account information, which is applied to first electronic equipment, wherein the first electronic equipment is in communication connection with second electronic equipment through a server, and the method comprises the following steps: obtaining a first operation of a first electronic device; the first operation is operation information after the first account logs in; judging whether the first operation belongs to a preset operation or not; when the operation is a preset operation, obtaining first historical operation information of the first electronic equipment, wherein the first historical operation information is stored in the server; judging whether the first operation is consistent with the first historical operation information or not; when the first instruction is consistent with the second instruction, obtaining a first instruction; obtaining a second operation according to the first operation, wherein the second operation is a confirmation operation of the second electronic equipment for the first operation; the second operation is operation information after the second account is logged in; obtaining a first feedback result from the second electronic device, wherein the first feedback result is a judgment result generated by a confirmation operation of the second electronic device on the first operation; obtaining a second feedback result from a server, wherein the second feedback result is a judgment result of whether the confirmation operation is consistent with second historical operation information or not according to the second historical operation information stored in the server after the confirmation operation of the second electronic equipment is sent to the server; obtaining a second instruction according to the first feedback result and the second feedback result; and obtaining a third instruction according to the first instruction and the second instruction, wherein the third instruction is used for verifying the validity of the operation after the first account is logged in.
On the other hand, an embodiment of the present application provides an account information verification apparatus, where the apparatus includes: a first obtaining unit configured to obtain a first operation of a first electronic device; the first operation is operation information after the first account number is logged in; a first judging unit configured to judge whether the first operation belongs to a predetermined operation; a second obtaining unit configured to obtain first historical operation information of the first electronic device stored in the server; a second determination unit configured to determine whether the first operation is consistent with the first historical operation information; a third obtaining unit to obtain a first instruction; a fourth obtaining unit, configured to obtain a second operation according to the first operation, where the second operation is a confirmation operation of the second electronic device for the first operation; the second operation is operation information after the second account is logged in; a fifth obtaining unit, configured to obtain a first feedback result from the second electronic device, where the first feedback result is a determination result generated by a confirmation operation of the second electronic device on the first operation; a sixth obtaining unit, configured to obtain a second feedback result from a server, where the second feedback result is a determination result of verifying, by the server, whether a confirmation operation of the second electronic device is consistent with second historical operation information stored in the server after the confirmation operation is sent to the server; a seventh obtaining unit, configured to obtain a second instruction according to the first feedback result and the second feedback result; an eighth obtaining unit to obtain a third instruction according to the first instruction and the second instruction; and the first verification unit is used for verifying the legality of the operation after the first account login according to a third instruction.
In another aspect, an apparatus for account information verification is provided in an embodiment of the present application, and includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method when executing the program.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
1. the first operation of the logged account is verified in a mode of comparing and verifying the first operation with the first operation record, so that the problems that the account safety cannot be protected and the like due to the fact that only password login or decryption module verification is conducted in the prior art are effectively solved, account login is verified logically through the mode of comparing the first operation after the account login with the first historical operation record, and the technical effect of improving the information safety of the account is achieved.
2. Because the mode that the second equipment logs in the second account to confirm the operation of the first account is adopted, the problems that the password login or decryption module verification is too simple and the account safety cannot be protected in the prior art are effectively solved, the logic of confirming the operation of the first account by adding the second account is used for further encryption protection of the first account, and the technical effect of improving the safety of the first account is realized.
3. As the first operation of the first account and the second operation of the second account are respectively compared with the operation history records, the mode of verifying the security of the first account by obtaining the final verification instruction is obtained, the effect of performing deeper encryption protection on account verification is achieved, and the security of the account is further improved.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
Fig. 1 is a schematic flowchart illustrating a method for verifying account information according to an embodiment of the present disclosure;
fig. 2 is a schematic instruction flow diagram of a method for verifying account information according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a device of a method for verifying account information according to an embodiment of the present application;
FIG. 4 is a schematic structural diagram of an exemplary electronic device according to an embodiment of the present application;
description of reference numerals: a first obtaining unit 11, a first judging unit 12, a second obtaining unit 13, a second judging unit 14, a third obtaining unit 15, a fourth obtaining unit 16, a fifth obtaining unit 17, a sixth obtaining unit 18, a seventh obtaining unit 19, an eighth obtaining unit 20, a first verifying unit 21, a bus 300, a receiver 301, a processor 302, a transmitter 303, a memory 304, and a bus interface 306.
Detailed Description
The embodiment of the application provides a verification method and device for account information, solves the problems that in the prior art, the account login protection means is too single, or too simple, and the security of the account cannot be effectively guaranteed, and achieves the technical effect of improving the security of the account information. Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are merely some embodiments of the present application and not all embodiments of the present application, and it should be understood that the present application is not limited to the example embodiments described herein.
Summary of the application
Different accounts of an enterprise store information with different importance degrees, and the related verification means of the login account is only password verification or simple authentication according to a decryption module at present. The above authentication method has the following problems: the related account information is easy to reveal, the account safety cannot be effectively protected, and the information safety in the account cannot be ensured.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
a verification method of account information is applied to first electronic equipment, and the first electronic equipment is in communication connection with second electronic equipment through a server, wherein the method comprises the following steps: obtaining a first operation of a first electronic device; the first operation is operation information after the first account logs in; judging whether the first operation belongs to a preset operation or not; when the operation is a preset operation, obtaining first historical operation information of the first electronic equipment, wherein the first historical operation information is stored in the server; judging whether the first operation is consistent with the first historical operation information or not; the first operation and the first historical operation information are operation sequences; when the first instruction is consistent with the second instruction, obtaining a first instruction; obtaining a second operation according to the first operation, wherein the second operation is a confirmation operation of the second electronic equipment for the first operation; the second operation is operation information after the second account is logged in; obtaining a first feedback result from the second electronic device, wherein the first feedback result is a judgment result generated by a confirmation operation of the second electronic device on the first operation; obtaining a second feedback result from a server, wherein the second feedback result is a judgment result of whether the confirmation operation is consistent with second historical operation information or not according to the second historical operation information stored in the server after the confirmation operation of the second electronic equipment is sent to the server; obtaining a second instruction according to the first feedback result and the second feedback result; and obtaining a third instruction according to the first instruction and the second instruction, wherein the third instruction is used for verifying the legality of the operation after the first account is logged in.
Having thus described the general principles of the present application, various non-limiting embodiments thereof will now be described in detail with reference to the accompanying drawings.
Example one
As shown in fig. 1, an embodiment of the present application provides an account information verification method, which is applied to a first electronic device, where the first electronic device is in communication connection with a second electronic device through a server, and the method includes:
step S110: obtaining a first operation of a first electronic device; the first operation is operation information after the first account logs in;
specifically, the first electronic device may be a fund transaction device, the first operation may be a first operation after logging in a first account, when a transaction worker modifies fund data, the first operation is to log in the account, after logging in the account, the first operation of the operator on the first electronic device is acquired, the first operation is preliminarily authenticated, and the identity of the operator as a legal account user is ensured by adding a mode of distinguishing the preliminary authentication, so that the effect of improving the account information security is achieved.
Step S120: judging whether the first operation belongs to a preset operation or not;
specifically, the first electronic device determines whether the first electronic device belongs to a preset predetermined operation according to the obtained first operation information after logging in the account. The account login is verified from the operation logic by comparing the first operation information after the account login with the preset operation information, so that the effect of improving the information security of the account is achieved.
Step S130: when the operation is a preset operation, obtaining first historical operation information of the first electronic equipment, wherein the first historical operation information is stored in the server;
specifically, the first electronic device is connected with a server, first historical operation information is stored in the server, and when a first operation is performed on a login account, the first electronic device is triggered to acquire the first historical operation information stored in the server.
Step S140: judging whether the first operation is consistent with the first historical operation information or not;
specifically, the server stores first historical operation information, and the historical operation information can be operation content or related operation sequence. Comparing and judging the first operation information after the account is logged in with the first historical operation content or the related operation sequence stored in the server in advance, and when the information of the first operation is judged to be consistent with the first historical operation information stored in the server, continuing the following operation. Furthermore, the operation content and the operation sequence can be organically combined with each other, and the verification can be passed only by performing combination processing according to the preset operation sequence and the operation content. In practice, each person may have different operation habits for the same operation, for example, rhythm and strength of keyboard strokes, and such information may be stored in the server as the first historical operation record to authenticate the first operation. Therefore, if different people perform operation, even if the operation content and the operation sequence are the same, the first operation and the first historical operation information are not matched due to different rhythms and strengths of keyboard strokes. In practice, the comparison between the setting and the historical data, not the normative data, is used for further enhancing the identification of the operator. That is to say, various information with personal characteristics is stored in the history data, and after the information of the first operation is collected, the information is listed into the history information and is prestored for subsequent verification, and the information is stored in the server, so that the first operation can be further authenticated, and the effect of improving the account security is achieved.
Further, for the step of determining whether the first operation is consistent with the first historical operation information, the method further includes:
and inputting the first historical operation information into a machine learning model, wherein the machine learning model comprises a first operation and identification information used for identifying that the first operation is consistent with the first historical operation information. That is, when the above-described first operation is input into the model, a conclusion whether the operation coincides with the first history operation information is automatically determined based on machine learning. For the model itself, whether the consistent supervision data comes from the acceptance of the subsequent higher authority manager for the operation indicates yes in the supervision data if the acceptance indicates no. Whether consistent conclusions exist is continuously optimized through continuous learning of the models, and then consistent judgment results are improved through the machine model, and the processing efficiency and accuracy of the processing method are improved.
Further, after the first operation information is input into the machine learning model, the output information of the model is obtained, and the output information is the conclusion that whether the first operation is consistent with the first historical operation information or not, namely whether the first operation is consistent with the first historical operation information or not.
Further, in order to ensure the technical effect between safety and effective flexibility, the embodiment of the present application further includes: obtaining different operations between the first operation and the first historical operation information, obtaining a standard operation record, comparing the corresponding different operations with the standard operation record, obtaining an operation difference value, inputting the standard difference value into another machine learning model, wherein the machine learning model comprises the standard difference value and safety information used for identifying the standard difference value.
Step S150: when the first instruction is consistent with the second instruction, obtaining a first instruction;
specifically, when the first operation information coincides with first historical operation information prestored in the server, a first instruction based on the final determination is obtained.
Step S160: obtaining a second operation according to the first operation, wherein the second operation is a confirmation operation of the second electronic equipment for the first operation; the second operation is operation information after the second account logs in.
Specifically, the first electronic device is in communication connection with the second electronic device, the second account is used for logging in the second electronic device, and the second account has relevance with the first account; when the first account logs in the first electronic device to perform the first operation, the second account logs in the second electronic device to perform the confirmation operation for the first operation, which can be understood as the acceptance of the higher-authority manager for the first operation. And the confirmation operation of the second account is the second operation. The method includes the steps that a second account is added to confirm a first operation of a first account, so that the first operation is limited in authority, and the safety of the first account operation is guaranteed.
Step S170: and obtaining a first feedback result from the second electronic equipment, wherein the first feedback result is a judgment result generated by the confirmation operation of the second electronic equipment on the first operation.
Specifically, after the second electronic device determines the first operation, the determination result is defined as a first feedback result.
Step S180: and obtaining a second feedback result from the server, wherein the second feedback result is a judgment result of verifying whether the confirmation operation is consistent with second historical operation information according to the second historical operation information stored in the server after the confirmation operation of the second electronic equipment is sent to the server.
Specifically, the server prestores second historical operation information, and after the server obtains the confirmation operation of the second electronic device, the confirmation operation of the second electronic device is compared with the second historical operation information to generate a second feedback result. Furthermore, the operation content and the operation sequence can be organically combined with each other, and the verification can be passed only by performing combination processing according to the predetermined operation sequence and the operation content. Specifically, the content of the comparison of the first operation with the first operation history information may be referred to. The validity of the confirmation operation of the second electronic equipment is guaranteed through further comparison and confirmation of the confirmation operation of the second electronic equipment, and then the safety of the operation of the first account is protected, so that the safety of the first account is protected.
Step S190: obtaining a second instruction according to the first feedback result and the second feedback result;
specifically, the result of the determination of the first operation by the second electronic device is the first feedback result, and when the second electronic device is determined to confirm that the first operation passes, the first feedback result is Y1; when the second electronic device is judged to confirm that the first operation is not passed, the first feedback result is N1; comparing the confirmation operation of the second electronic equipment with second historical operation information stored in the server, and generating a second feedback result Y2 when the confirmation operation of the second electronic equipment is consistent with the second historical operation information stored in the server; if they do not match, a second feedback result is generated as N2. At this point, the second instruction has four results: Y1Y2, Y1N2, N1Y2, N1N 2.
Step S200: obtaining a third instruction according to the first instruction and the second instruction, wherein the third instruction is used for verifying the validity of the operation after the first account number logs in;
specifically, the third instruction is obtained from a combination of the first instruction and the second instruction described above; if and only if the combination is the first instruction + the second instruction (Y1Y2), the obtained third instruction determines that the operation after the first account login is legal; the remaining instruction combinations: and the third instruction obtained by the first instruction + the second instruction (Y1N2), the first instruction + the second instruction (N1Y2) and the first instruction + the second instruction (N1N2) judges that the operation of the first account is illegal after login, and the account is forcibly logged out.
In order to further improve the security of the account information, the above steps are further detailed with reference to the above operation steps and fig. 1. Wherein the method comprises the following steps: judging the relevance of the second account and the first account; when the second account number and the first account number meet the relevance, a fourth instruction is obtained; the third instruction and the fourth instruction obtain a fifth instruction, and the fifth instruction is used for verifying the validity of the operation after the first account login.
Specifically, the fact that the first account number and the second account number have a certain association can be specifically understood as follows: the second account is a superior unit or a safety certification account of the first account, each first account has at least one second account corresponding to the first account for safety certification, and when the first account and the second account meet the relevance, a fourth instruction can be obtained; the method has the advantages that the limitation on the relevance of the second account and the first account is essentially the limitation on the confirmation operation permission of the first account, so that the first operation of the first account is guaranteed to be approved by a higher-layer manager, the legality of the operation after the first account is logged in is verified, and the safety of the first account is improved.
Further, the determining whether the first operation is consistent with the first historical operation information specifically includes: the first operation and the first historical operation information are operation contents; it is determined whether the operation content of the first operation coincides with the operation content of the first history operation information.
Specifically, when the first operation is compared with the first historical operation information, the operation content of the first operation can be compared, and in a simple way, the operation content can be a sentence, or a program or a file can be opened; the first operation after login and the historical information are verified, so that the behavior of account login operation is complicated, and meanwhile, the safety and reliability of the account are improved through the verification means.
Further, the determining whether the first operation is consistent with the first historical operation information specifically includes: the first operation and the first historical operation information are operation sequences; it is determined whether an operation order of the first operation coincides with an operation order of the first history operation information.
Specifically, when comparing the first operation with the first historical operation information (or comparing the second operation with the second historical operation information, which is not described herein), the operation sequence may be compared in addition to the operation content. In short, if the limitation on the operation content is the original purpose of simply encrypting the account information, the further comparison and verification on the operation sequence is a further consideration for improving the account security. The comparison of the operation contents can be understood as that three files are opened A, B, C, and the further limitation of the operation sequence can be understood as that based on the logic defined by the contents, not only three files are opened A, B, C, but also three files are opened in sequence A, B, C, and the first operation is consistent with the historical operation information. On the basis of the limitation of the operation content, the operation sequence of the first operation is further limited, so that the verification precision of the first operation is further achieved, and the effect of effectively guaranteeing the account safety is achieved.
Furthermore, the operation content and the operation sequence can be organically combined with each other, and the verification can be passed only by performing the combination processing according to the preset operation sequence and the operation content. In practice, each person may have different operation habits for the same operation, for example, rhythm and strength of keyboard strokes, and such information may be stored in the server as the first historical operation record to authenticate the first operation. Therefore, if different people perform operations, even if the content and the operation sequence of the operations are the same, the first operation and the first historical operation information are not matched due to different rhythms and strengths of keyboard strokes. In practice, the comparison between the setting and the historical data, not the normative data, is used for further enhancing the identification of the operator. That is to say, various information with personal characteristics is stored in the history data, and after the information of the first operation is collected, the information is listed into the history information and is prestored for subsequent verification, and the information is stored in the server, so that the first operation can be further authenticated, and the effect of improving the account security is achieved.
Further, wherein the method further comprises: obtaining first image information of a first electronic device; acquiring second image information of the first account; obtaining third image information of the second electronic equipment; obtaining fourth image information of the second account; obtaining a first result according to the first image information and the second image information; obtaining a second result according to the third image information and the fourth image information; acquiring an image logic relationship between a first account and a second account; and obtaining a sixth instruction according to the image logic relationship, the first result and the second result, and obtaining a seventh instruction according to the sixth instruction and the fifth instruction, wherein the seventh instruction is used for verifying the operation validity of the first account after login.
Specifically, according to the matching of first image information of first electronic equipment and second image information of a first account, whether the first account has the authority of logging in the first electronic equipment is judged, and a first result is obtained according to the authority; similarly, according to the matching of the third image information of the second electronic device and the fourth image information of the second account, a second result of judging whether the second account has the authority of logging in the second electronic device is obtained; and obtaining a sixth instruction according to the image logic relationship between the first account and the second account, the first result and the second result, and obtaining a seventh instruction for verifying the operation validity of the first account after logging in through the sixth instruction and the fifth instruction. By refining the relevance into an image information matching form, the relevance between the first account and the second account is limited, and the relevance between the first account and the second account and between the first electronic equipment and the second electronic equipment is controlled.
Further, wherein the method further comprises: acquiring a first decryption module, wherein first account information is stored in the first decryption module; the first decryption module is inserted into the first electronic equipment; verifying the security of the first decryption module to obtain a third result; acquiring a second decryption module, wherein second account information is stored in the second decryption module; the second decryption module is inserted into the second electronic equipment; verifying the security of the second decryption module to obtain a fourth result; obtaining an eighth instruction according to the third result and the fourth result; obtaining a ninth instruction according to the seventh instruction and the eighth instruction; the ninth instruction is used for verifying the operation validity of the first account after logging in.
Specifically, first account information is stored in the first decryption module, second account information is stored in the second decryption module, when a trader logs in with a first account, the first decryption module needs to be inserted into the first electronic device for security authentication, and a third result is generated according to the authentication result of the first decryption module; after the operator with the confirmation authority logs in the second account, the second decryption module needs to be inserted into the second electronic device for security authentication, and a fourth result is generated according to the authentication result of the second decryption module; and obtaining an eighth instruction according to the third result and the fourth result, and further obtaining a ninth instruction according to the seventh instruction and the eighth instruction, wherein the ninth instruction is used for verifying the operation validity of the first account after logging in. The account information stored in the local by the decryption module is authenticated, so that the owner and the user of the decryption module and the operator of the electronic equipment are unified, the security is improved, the possibility of tampering the account information after a hacker invades the system is effectively avoided, and the effects of improving the account security and ensuring the account security are achieved.
Further, wherein the method comprises: obtaining first position information of first electronic equipment; obtaining second position information of a second electronic device; obtaining a tenth instruction according to the first position information and the second position; and obtaining an eleventh instruction according to the tenth instruction and the ninth instruction, wherein the eleventh instruction is used for verifying the operation validity of the first account after logging in.
Specifically, the instruction information verification will be described in detail below with reference to fig. 2. Obtaining a first instruction according to the judgment whether the first operation is consistent with the first operation historical information; obtaining a second instruction according to a first feedback result of the second electronic device and a second feedback result of the server; acquiring a third instruction according to the first instruction and the second instruction; obtaining a fourth instruction according to the relevance of the first account and the second account; acquiring a fifth instruction according to the third instruction and the fourth instruction; obtaining a sixth instruction according to the image logic relationship, the first result and the second result; obtaining a seventh instruction according to the fifth instruction and the sixth instruction; obtaining an eighth instruction according to the third result and the fourth result; acquiring a ninth instruction according to the seventh instruction and the eighth instruction; and obtaining a tenth instruction by performing position limitation through the position information of the first electronic equipment and the second electronic equipment, and obtaining an eleventh instruction for verifying the login validity of the first account according to the ninth instruction and the tenth instruction. Through the instruction acquisition logic with layer-by-layer progression, the links are verified layer by layer, so that the safety and reliability of each progression link are guaranteed, an eleventh instruction for finally verifying the safety of the first account is obtained, and the effect of guaranteeing the safety of the account information is achieved by using the eleventh instruction.
Further, wherein the method comprises: the first historical operating information further includes: and summarizing the third history operation information of the third account and the first history operation information to form operation information.
Specifically, the third account stores third history operation information, and the first history information further includes operation information summarized by the third history operation information and the first history operation information; the third account is added to protect the historical operation information of the third account, and the effect of encryption protection on the first historical operation information is achieved through the collection of the third historical operation information and the first historical operation information, so that the safety of the first historical operation information is improved, the safety of the first operation of the first electronic device is further guaranteed, and the final purpose of improving the safety of the first account is achieved.
1. The method for verifying the first operation of the logged account by comparing the first operation with the first operation record is adopted to verify the first operation of the logged account, so that the problems that the security of the account cannot be protected only by a password login or decryption module in the prior art are effectively solved, the account login is verified logically by increasing the comparison of the first operation after the account login and the first historical operation record, and the technical effect of improving the information security of the account is realized.
2. Because the mode that the second equipment logs in the second account to confirm the operation of the first account is adopted, the operation permission of the first account is effectively limited, and the operation can be continued only under the condition of obtaining the permission of higher permission. The password login or decryption module verification is too simple, the account number safety cannot be protected and the like in the prior art, the logic of confirming the operation of the first account number is added through the second account number, the first account number is further encrypted and protected, and the technical effect of improving the safety of the first account number is achieved.
3. The first account and the second account and the relevance of the electronic equipment respectively corresponding to the first account and the second account are verified, namely, the first account and the second account are verified through the logic relation of the prestored images among the first account, the second account and the electronic equipment corresponding to the first account, so that the verification effect of the first account and the second account is achieved, the safety of the confirmation operation of the second account on the first account is ensured, and the purpose of protecting the safety of the operation of the first account is further achieved.
4. Because the modes of the decryption module verification, the position information verification, the third account historical information and the first historical operation information summary information and the like are adopted, the three dimensions of the security authentication dimension, the position dimension and the historical operation information encryption dimension are carried out on the existing environment for confirmation, the security of the first account operation environment is ensured, and the purpose of improving the security of the first account is further achieved.
5. Because the logic of layer-by-layer progressive instruction verification is adopted, the steps are verified layer-by-layer, and the safety and reliability of each progressive step are further ensured, so that an eleventh instruction for finally verifying the safety of the first account is obtained, and the effect of guaranteeing the safety of the account information is achieved through the eleventh instruction.
Example two
Based on the same inventive concept as the method for verifying account information in the foregoing embodiment, the present invention further provides an apparatus for verifying account information, as shown in fig. 3, the apparatus includes:
a first obtaining unit 11, wherein the first obtaining unit 11 is used for obtaining a first operation of obtaining a first electronic device; the first operation is operation information after the first account number is logged in;
a first judging unit 12, wherein the first judging unit 12 is used for judging whether the first operation belongs to a preset operation;
a second obtaining unit 13, where the second obtaining unit 13 is configured to obtain first historical operation information of the first electronic device, where the first historical operation information is stored in the server;
a second determination unit 14, where the second determination unit 14 is configured to determine whether the first operation is consistent with the first historical operation information;
a third obtaining unit 15, said third obtaining unit 15 being configured to obtain a first instruction;
a fourth obtaining unit 16, configured to obtain a second operation according to the first operation, where the second operation is a confirmation operation of the second electronic device for the first operation; the second operation is operation information after the second account is logged in;
a fifth obtaining unit 17, where the fifth obtaining unit 17 is configured to obtain a first feedback result from the second electronic device, where the first feedback result is a determination result generated by a confirmation operation of the second electronic device on the first operation;
a sixth obtaining unit 18, where the sixth obtaining unit 18 is configured to obtain a second feedback result from a server, where the second feedback result is a determination result of verifying, by the server, whether a confirmation operation of the second electronic device is consistent with second historical operation information according to the second historical operation information stored in the server after the confirmation operation is sent to the server;
a seventh obtaining unit 19, where the seventh obtaining unit 19 is configured to obtain a second instruction according to the first feedback result and the second feedback result;
an eighth obtaining unit 20, the eighth obtaining unit 20 configured to obtain a third instruction according to the first instruction and the second instruction;
the first verification unit 21 is configured to verify the validity of the operation after the first account is logged in according to a third instruction;
further, the apparatus further comprises:
a third judging unit, configured to judge a relationship between the second account and the first account;
further, the apparatus further comprises:
a ninth obtaining unit, configured to obtain a fourth instruction when the second account and the first account satisfy a relationship;
further, the apparatus further comprises:
a tenth obtaining unit to obtain a fifth instruction from the third instruction and the fourth instruction;
further, the apparatus further comprises:
the second verification unit is used for verifying the legality of the operation after the first account number is logged in according to a fifth instruction;
further, the apparatus further comprises:
a fourth determination unit configured to determine whether or not an operation content of the first operation coincides with an operation content of the first history operation information;
further, the apparatus further comprises:
a fifth judging unit configured to judge whether or not an operation order of the first operation coincides with an operation order of the first history operation information;
further, the apparatus further comprises:
an eleventh obtaining unit configured to obtain first image information of a first electronic device;
further, the apparatus further comprises:
a twelfth obtaining unit, configured to obtain second image information of the first account;
further, the apparatus further comprises:
a thirteenth obtaining unit configured to obtain third image information of a second electronic device;
further, the apparatus further comprises:
a fourteenth obtaining unit configured to obtain fourth image information for obtaining the second account;
further, the apparatus further comprises:
a fifteenth obtaining unit to obtain a first result from the first image information and the second image information;
further, the apparatus further comprises:
a sixteenth obtaining unit configured to obtain a second result from the third image information and the fourth image information;
further, the apparatus further comprises:
a seventeenth obtaining unit configured to obtain an image logical relationship between the first account and the second account;
further, the apparatus further comprises:
an eighteenth obtaining unit, configured to obtain a sixth instruction according to the image logical relationship, the first result, and the second result;
further, the apparatus further comprises:
a nineteenth obtaining unit to obtain a seventh instruction according to the sixth instruction and the fifth instruction;
further, the apparatus further comprises:
the third verification unit is used for verifying the operation validity of the first account after logging in according to the seventh instruction;
further, the apparatus further comprises:
a twentieth obtaining unit, configured to obtain a first decryption module, where first account information is stored in the first decryption module; the first decryption module is inserted into the first electronic equipment;
further, the apparatus further comprises:
a twenty-first obtaining unit, configured to verify security of the first decryption module to obtain a third result;
further, the apparatus further comprises:
a twenty-second obtaining unit, configured to obtain a second decryption module, where second account information is stored in the second decryption module; the second decryption module is inserted into the second electronic equipment;
further, the apparatus further comprises:
a twenty-third obtaining unit to verify security of the second decryption module to obtain a fourth result;
further, the apparatus further comprises:
a twenty-fourth obtaining unit to obtain an eighth instruction according to the third result and the fourth result;
further, the apparatus further comprises:
a twenty-fifth obtaining unit to obtain a ninth instruction from the seventh instruction and the eighth instruction;
further, the apparatus further comprises:
a fourth verifying unit, configured to verify operation validity of the first account after login according to the ninth instruction;
further, the apparatus further comprises:
a twenty-sixth obtaining unit configured to obtain first location information of the first electronic device;
further, the apparatus further comprises:
a twenty-seventh obtaining unit configured to obtain second location information of a second electronic device;
further, the apparatus further comprises:
a twenty-eighth obtaining unit to obtain a tenth instruction according to the first position information and the second position;
further, the apparatus further comprises:
a twenty-ninth obtaining unit to obtain an eleventh instruction from the tenth and ninth instructions;
further, the apparatus further comprises:
a fifth verification unit, configured to verify operation validity after the first account is logged in according to the eleventh instruction;
further, the apparatus further comprises:
a thirtieth obtaining unit, configured to obtain operation information formed by summarizing third history operation information according to a third account and the first history operation information;
exemplary electronic device
The electronic device of the embodiment of the present application is described below with reference to fig. 4.
Fig. 4 illustrates a schematic structural diagram of an electronic device according to an embodiment of the present application.
Based on the inventive concept of the method for verifying account information in the foregoing embodiments, the present invention further provides an apparatus for verifying account information, wherein the apparatus stores a computer program, and the computer program is executed by a processor to implement the steps of any one of the methods for verifying account information described above.
Wherein in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other apparatus over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A verification method of account information is applied to first electronic equipment, and the first electronic equipment is in communication connection with second electronic equipment through a server, wherein the method comprises the following steps:
obtaining a first operation of a first electronic device; the first operation is operation information after the first account logs in;
judging whether the first operation belongs to a preset operation or not;
when the operation is a preset operation, obtaining first historical operation information of the first electronic equipment, wherein the first historical operation information is stored in the server;
judging whether the first operation is consistent with the first historical operation information or not;
when the first instruction is consistent with the second instruction, obtaining a first instruction;
obtaining a second operation according to the first operation, wherein the second operation is a confirmation operation of the second electronic equipment for the first operation; the second operation is operation information after the second account is logged in;
obtaining a first feedback result from the second electronic device, wherein the first feedback result is a judgment result generated by a confirmation operation of the second electronic device on the first operation;
obtaining a second feedback result from a server, wherein the second feedback result is a judgment result of whether the confirmation operation is consistent with second historical operation information or not according to the second historical operation information stored in the server after the confirmation operation of the second electronic equipment is sent to the server;
obtaining a second instruction according to the first feedback result and the second feedback result;
and obtaining a third instruction according to the first instruction and the second instruction, wherein the third instruction is used for verifying the legality of the operation after the first account is logged in.
2. The method of claim 1, wherein the method comprises:
judging the relevance of the second account and the first account;
when the second account number and the first account number meet the relevance, a fourth instruction is obtained;
and the third instruction and the fourth instruction obtain a fifth instruction, wherein the fifth instruction is used for verifying the validity of the operation after the first account is logged in.
3. The method of claim 2, wherein the determining whether the first operation is consistent with the first historical operation information includes:
the first operation and the first historical operation information are operation contents;
it is determined whether the operation content of the first operation coincides with the operation content of the first history operation information.
4. The method of claim 3, wherein the determining whether the first operation is consistent with the first historical operation information includes:
the first operation and the first historical operation information are operation sequences;
whether the operation sequence of the first operation is consistent with the operation sequence of the first historical operation information is judged.
5. The method of claim 4, wherein the method further comprises:
obtaining first image information of a first electronic device;
acquiring second image information of the first account;
obtaining third image information of a second electronic device;
obtaining fourth image information of the second account;
obtaining a first result according to the first image information and the second image information;
obtaining a second result according to the third image information and the fourth image information;
acquiring an image logic relationship between a first account and a second account;
obtaining a sixth instruction according to the image logic relationship, the first result and the second result
And obtaining a seventh instruction according to the sixth instruction and the fifth instruction, wherein the seventh instruction is used for verifying the operation validity of the first account after logging in.
6. The method of claim 5, wherein the method further comprises:
obtaining a first decryption module, wherein first account information is stored in the first decryption module; the first decryption module is inserted into the first electronic equipment;
verifying the security of the first decryption module to obtain a third result;
obtaining a second decryption module, wherein second account information is stored in the second decryption module; the second decryption module is inserted into the second electronic equipment;
verifying the security of the second decryption module to obtain a fourth result;
obtaining an eighth instruction according to the third result and the fourth result;
obtaining a ninth instruction according to the seventh instruction and the eighth instruction; the ninth instruction is used for verifying the operation validity of the first account after logging in.
7. The method of claim 6, wherein the method comprises:
obtaining first position information of first electronic equipment;
obtaining second position information of a second electronic device;
obtaining a tenth instruction according to the first position information and the second position;
and obtaining an eleventh instruction according to the tenth instruction and the ninth instruction, wherein the eleventh instruction is used for verifying the operation validity of the first account after logging in.
8. The method of claim 7, wherein the method comprises:
the first historical operating information further includes: and summarizing the third history operation information of the third account and the first history operation information to form operation information.
9. An apparatus for verifying account information, the apparatus comprising:
a first obtaining unit configured to obtain a first operation of a first electronic device; the first operation is operation information after the first account logs in;
a first judging unit configured to judge whether the first operation belongs to a predetermined operation;
a second obtaining unit configured to obtain first historical operation information of the first electronic device, the first historical operation information being stored in a server;
a second determination unit configured to determine whether the first operation is consistent with the first historical operation information;
a third obtaining unit to obtain a first instruction;
a fourth obtaining unit, configured to obtain a second operation according to the first operation, where the second operation is a confirmation operation of the second electronic device for the first operation; the second operation is operation information after the second account is logged in;
a fifth obtaining unit, configured to obtain a first feedback result from the second electronic device, where the first feedback result is a determination result generated by a confirmation operation of the second electronic device on the first operation;
a sixth obtaining unit, configured to obtain a second feedback result from a server, where the second feedback result is a determination result of verifying, by the server, whether a confirmation operation of the second electronic device is consistent with second historical operation information stored in the server after the confirmation operation is sent to the server;
a seventh obtaining unit, configured to obtain a second instruction according to the first feedback result and the second feedback result;
an eighth obtaining unit to obtain a third instruction according to the first instruction and the second instruction;
and the first verification unit is used for verifying the legality of the operation after the first account is logged in according to the third instruction.
10. An apparatus for account information verification, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the steps of the method of any one of claims 1 to 8.
CN202010673231.4A 2020-07-14 2020-07-14 Account information verification method and device Active CN111988274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010673231.4A CN111988274B (en) 2020-07-14 2020-07-14 Account information verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010673231.4A CN111988274B (en) 2020-07-14 2020-07-14 Account information verification method and device

Publications (2)

Publication Number Publication Date
CN111988274A CN111988274A (en) 2020-11-24
CN111988274B true CN111988274B (en) 2022-06-21

Family

ID=73437677

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010673231.4A Active CN111988274B (en) 2020-07-14 2020-07-14 Account information verification method and device

Country Status (1)

Country Link
CN (1) CN111988274B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105225111A (en) * 2014-06-17 2016-01-06 阿里巴巴集团控股有限公司 A kind of method and apparatus of online payment checking
CN107196894A (en) * 2016-03-15 2017-09-22 阿里巴巴集团控股有限公司 Obtain the method and device of account authorization message

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110213711A1 (en) * 2010-03-01 2011-09-01 Entrust, Inc. Method, system and apparatus for providing transaction verification
CN104144419B (en) * 2014-01-24 2017-05-24 腾讯科技(深圳)有限公司 Identity authentication method, device and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105225111A (en) * 2014-06-17 2016-01-06 阿里巴巴集团控股有限公司 A kind of method and apparatus of online payment checking
CN107196894A (en) * 2016-03-15 2017-09-22 阿里巴巴集团控股有限公司 Obtain the method and device of account authorization message

Also Published As

Publication number Publication date
CN111988274A (en) 2020-11-24

Similar Documents

Publication Publication Date Title
CN110598376B (en) Copyright authentication method, device and equipment based on block chain and storage medium
CN109274652B (en) Identity information verification system, method and device and computer storage medium
US8271781B2 (en) System and method for authentication of a hardware token
US20210243037A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US20110289318A1 (en) System and Method for Online Digital Signature and Verification
US20230412399A1 (en) Database Multi-Authentication Method and System, Terminal, and Storage Medium
US11743050B2 (en) Computer system and method for distributed privacy-preserving shared execution of one or more processes
CN107563176A (en) Login authentication method, system, readable storage medium storing program for executing and computer based on USB flash disk
CN111914293A (en) Data access authority verification method and device, computer equipment and storage medium
CN112069527A (en) Tax control invoice protection method and system based on multiple safety protection measures
CN111666591A (en) Online underwriting data security processing method, system, equipment and storage medium
CN108769004B (en) Remote operation safety verification method for industrial internet intelligent equipment
CN111988274B (en) Account information verification method and device
CN110472423A (en) A kind of nuclear power station file permission management method, device and equipment
KR101360843B1 (en) Next Generation Financial System
CN112395574B (en) Safe login management method
CN110866069B (en) Identity management metadata processing method and system based on block chain
CN114282186A (en) Method and system for safely exporting large file data
CN102789563A (en) Protecting system for information safety of website background program and protecting method thereof
Kuhn et al. Formal specification and verification of control software for cryptographic equipment
CN111797379B (en) Processing method and device for improving information security
KR102048025B1 (en) System and method for secure and convenient approval of document based on authentication protocol
CN111382420A (en) Data transaction method, device, system, electronic equipment and readable storage medium
Brandl Trusted computing: The tcg trusted platform module specification
CN116756717A (en) Information protection method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant