CN112383912B - Account opening method, server, system and storage medium - Google Patents

Account opening method, server, system and storage medium Download PDF

Info

Publication number
CN112383912B
CN112383912B CN202011203550.5A CN202011203550A CN112383912B CN 112383912 B CN112383912 B CN 112383912B CN 202011203550 A CN202011203550 A CN 202011203550A CN 112383912 B CN112383912 B CN 112383912B
Authority
CN
China
Prior art keywords
account opening
verification
server
key
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011203550.5A
Other languages
Chinese (zh)
Other versions
CN112383912A (en
Inventor
王帅
尚一多
孟庆轶
赵锐
张宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011203550.5A priority Critical patent/CN112383912B/en
Publication of CN112383912A publication Critical patent/CN112383912A/en
Application granted granted Critical
Publication of CN112383912B publication Critical patent/CN112383912B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Abstract

The invention provides an account opening method, a server, a system and a storage medium, which are applied to an account opening server and comprise the following steps: receiving an account opening application sent by a client, wherein the account opening application comprises an encrypted verification result and account opening data, and the encrypted verification result is obtained by verifying the account opening data by a verification server; decrypting the encrypted verification result by using a key to obtain a decryption result, wherein the key is received from the verification server; and whether a new account is created is determined according to the decryption result and the account opening data, so that the repeated verification times of account opening information are reduced, the account opening process is simplified, and the account opening efficiency is improved.

Description

Account opening method, server, system and storage medium
Technical Field
The present application relates to the field of information technologies, and in particular, to an account opening method, a server, a system, and a storage medium.
Background
With the development of intelligent terminals, most of telecommunication services can be handled through clients besides business halls.
When a new user transacts a card service in the telecommunication service, the user inputs account opening information through a client, for example: and inputting account opening information through an application program or a webpage, and submitting an account opening request to the server after the client finishes account opening information verification. And the server verifies again the account opening information carried in the account opening request and determines whether to open the account newly according to the verification result.
However, the existing account opening method has the problems that the client and the server need to verify the account opening information, so that the account opening process is complicated and the account opening time is long.
Disclosure of Invention
The application provides an account opening method, a server, a system and a storage medium, and aims to solve the technical problems of complicated account opening process and long account opening time caused by the existing account opening method.
In a first aspect, the present invention provides an account opening method applied to an account opening server, including:
receiving an account opening application sent by a client, wherein the account opening application comprises an encrypted verification result and account opening data, and the encrypted verification result is obtained by verifying the account opening data by a verification server;
decrypting the encrypted verification result by using a key to obtain a decryption result, wherein the key is received from the verification server;
and determining whether to create a new account according to the decryption result and the account opening data.
Optionally, determining whether to create a new account according to the decryption result and the account opening data specifically includes:
judging whether the decryption result indicates that the verification is passed;
if yes, creating a new account according to the account opening data;
if not, first prompt information of account opening failure is sent to the client.
Optionally, before determining whether the decryption result indicates that the verification passes, the method further includes:
judging whether the validity period of the decryption result is within a preset time limit or not;
if yes, continuously judging whether the decryption result indicates that the verification is passed;
and if not, sending second prompt information indicating that the verification result is invalid to the client.
Optionally, before determining whether the decryption result indicates that the verification passes, the method further includes:
acquiring a forced verification identifier in a decryption result;
judging whether the mandatory verification identifier indicates mandatory re-verification;
if so, sending account opening data to the verification server so that the verification server continues to verify the account opening data;
if not, whether the decryption result indicates that the verification is passed or not is continuously judged.
Optionally, before determining whether the decryption result indicates that the verification passes, the method further includes:
acquiring abstract data of account opening data;
judging whether the summary data of the account opening data is matched with the summary data of the verification information in the encrypted verification result;
if yes, continuously judging whether the decryption result indicates that the verification is passed;
if not, third prompt information indicating that the data are incomplete is sent to the client.
Optionally, before decrypting the encrypted verification result using the key to obtain a decrypted result, the method further includes:
receiving an encryption key sent by a verification server, wherein the encryption key is encrypted by using a public key, and the public key and a private key are a pair of asymmetric keys;
and decrypting the encrypted key by using the private key to obtain the key.
Optionally, before receiving the encryption key sent by the authentication server, the method further includes:
judging whether the validity period of the acquired key exceeds a preset period;
and if so, sending a key application to the verification server, wherein the key application is used for acquiring the key.
In a second aspect, the present invention provides an account opening method applied to a verification server, including:
receiving account opening data sent by a client;
verifying the account opening data to obtain a verification result;
encrypting the verification result by using the key to obtain an encrypted verification result;
and returning the encryption verification result to the client so that the client generates an account opening application according to the encryption verification result and the account opening data, so that the account opening server obtains a decryption result according to the account opening application and a key received from the verification server, and determines whether to create a new account according to the decryption result and the account opening data.
Optionally, after the user data is verified and before a verification result is obtained, the method further includes:
and adding attribute data to the verification result, wherein the attribute data comprises one or more combinations of a valid system, a forced verification identifier and summary data of the verification information.
Optionally, the method further comprises:
receiving a public key sent by an account opening server;
encrypting the key by using the public key to obtain an encryption key;
and sending the encryption key to the account opening server.
Optionally, the method further comprises:
judging whether the validity period of the secret key exceeds a preset time limit or not;
if yes, the key is updated.
In a third aspect, the present invention provides a server, comprising: a memory and a processor;
a memory; a memory for storing processor-executable instructions;
wherein the processor is configured to perform the account opening method according to the first aspect and the alternative.
In a fourth aspect, the present invention provides a server, comprising: a memory and a processor;
a memory; a memory for storing processor-executable instructions;
wherein the processor is configured to perform the account opening method according to the second aspect and the alternative.
In a fifth aspect, the present invention provides an account opening system, including: an account opening server of the third aspect, a verification server of the fourth aspect, and a client.
In a sixth aspect, the present invention provides a computer-readable storage medium having stored thereon computer-executable instructions for implementing the account opening method of or in connection with the first aspect and the alternative when executed by a processor.
The application provides an account opening method, a server, a system and a storage medium, wherein account opening data sent by a client is verified through a verification server to obtain a verification result, and the verification result is encrypted. And decrypting the encrypted result through the account opening server, and determining whether to create a new account according to the decrypted result and the account opening data. The account opening information is verified through the verification server, effective and safe transmission of verification results is achieved through the secret key, repeated verification times of the account opening information are reduced, the account opening process is simplified, and account opening efficiency is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic block diagram of an account opening system according to an exemplary embodiment of the present invention;
FIG. 2 is a flow chart illustrating an account opening method according to an exemplary embodiment of the present invention;
FIG. 3 is a flow chart diagram illustrating an account opening method in accordance with another exemplary embodiment of the present invention;
FIG. 4 is a flow chart diagram illustrating an account opening method in accordance with yet another exemplary embodiment of the present invention;
FIG. 5 is a flow chart diagram illustrating an account opening method in accordance with yet another exemplary embodiment of the present invention;
FIG. 6 is a schematic diagram illustrating a configuration of an account opening device 500 according to an exemplary embodiment of the present invention;
fig. 7 is a schematic structural diagram of an account opening apparatus 600 according to another exemplary embodiment of the present invention;
fig. 8 is a schematic diagram illustrating a hardware configuration of the server 70 according to an exemplary embodiment of the present invention.
Specific embodiments of the present application have been shown by way of example in the drawings and will be described in more detail below. These drawings and written description are not intended to limit the scope of the inventive concepts in any manner, but rather to illustrate the inventive concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
To make the purpose, technical solutions and advantages of the present application clearer, the technical solutions in the present application will be clearly and completely described below with reference to the drawings in the present application, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the development of intelligent terminals, most of telecommunication services can be handled through clients besides business halls. Due to the requirement of business process, various clients can verify information in the process of receiving account opening information, such as: user identity authentication, blacklist user verification, one-card five-user verification, number pre-occupation and the like. The client account opening information verification process needs to interact with a plurality of independent service systems. And after the information is verified, the client side can uniformly submit the account opening information to the account opening server, and the account opening server provides actual account opening service. And the account opening server needs to interact with each independent service system, verifies the account opening information again, and determines whether to open an account newly according to a verification result. However, the existing account opening method has the problems that the client and the server need to verify the account opening information, so that the account opening process is complicated and the account opening time is long.
The invention conception of the application is as follows: and verifying the account opening data sent by the client through the verification server to obtain a verification result, and encrypting the verification result. And decrypting the encrypted result through the account opening server, and determining whether to create a new account according to the decrypted result and the account opening data. The number of repeated checks of account opening information is reduced, the account opening process is simplified, and account opening efficiency is improved.
Fig. 1 is a schematic structural diagram of an account opening system according to an exemplary embodiment of the present invention. As shown in fig. 1, the account opening system provided in this embodiment includes: a client 110, a verification server 120, and an account opening server 130. The client 110 communicates with the authentication server 120, the client 110 communicates with the account opening server 130, and the authentication server 120 communicates with the account opening server 130. The client 110 is configured to collect account opening data, send the account opening data to the verification server 120, receive an encrypted verification result of the verification server 120, send an account opening application to the account opening server 130, and receive prompt information sent by the account opening server 130. The verification server 120 is configured to receive account opening data sent by the client 110, send an encrypted verification result to the client 110, receive a public key sent by the account opening server 130, and send an encrypted key to the account opening server 130. And the account opening server 130 is configured to receive an account opening application sent by the client 110, send prompt information to the client 110, send a public key to the verification server 120, and receive an encryption key sent by the verification server 120.
Fig. 2 is a flowchart illustrating an account opening method according to an exemplary embodiment of the present invention. As shown in fig. 2, the account opening method provided in this embodiment is based on the account opening system shown in fig. 1, and the account opening method includes the following steps:
s101, the client sends account opening data.
More specifically, the client is used for collecting account opening data, and the client can be a smart phone, a computer device and the like. The user can input account opening data in a website display page, an application program APP display page, an applet display page and the like. Wherein the account opening data comprises: user information and client identification, wherein the user information comprises a user mobile phone number, an identity card number, a residence address and the like. And after the client finishes the account opening data collection, sending the account opening data to the verification server.
S102, the verification server verifies the account opening data to obtain a verification result.
More specifically, the verification server receives account opening data sent by the client, verifies the account opening data, and generates a verification result, wherein the verification result includes verification passing, verification failure and the like.
For example, the account opening data includes a mobile phone number, and the mobile phone number is verified, whether the mobile phone number has undergone account opening service or not is verified, whether a short message verification code sent by a verification server can be successfully received or not, whether the mobile phone number is a real name registration mobile phone number of the user or not is verified, and whether the user is a blacklist user or not is verified. The account opening data comprises an identity card number, and whether the identity card number has been subjected to account opening service, whether the requirement of one card for five accounts is met or not and whether the identity card number passes through face recognition or not is verified. And if the requirements are verified, the verification result is verification pass. If any one of the verification items fails, the verification result is verification failure.
S103, the authentication server encrypts the authentication result by using the key to obtain an encrypted authentication result.
More specifically, the authentication server encrypts the authentication result by using the key to obtain an encrypted authentication result, wherein the encrypted authentication result further comprises digest data of the authentication information, a forced authentication identifier and a validity period of the authentication information. The verification information is account opening data of the client mobile phone. The forced authentication identification score may indicate forced re-authentication or not. If the forced authentication mark indicates forced re-authentication, the authentication server sends the forced re-authentication mark to the account opening server, and the account opening server forcibly submits the authentication information to the authentication server for authentication regardless of the encrypted authentication result. If the mandatory verification mark does not indicate the mandatory re-verification and is sent to the account opening server by the verification server, the account opening server executes a subsequent account opening process according to the encrypted verification result.
S104, the authentication server sends the encryption authentication result.
More specifically, the authentication server sends the encrypted authentication result to the client.
S105, the client sends an account opening application.
More specifically, the client receives the encrypted verification result sent by the verification server, and generates an account opening application according to the encrypted verification result and the account opening data. And sends an account opening application to the account opening server.
S106, the account opening server decrypts the encrypted verification result by using the secret key to obtain a decryption result.
More specifically, the account opening server receives an account opening application sent by the client, and decrypts the encrypted verification result by using the key character string obtained from the verification server to obtain a decryption result. The decryption result comprises a verification result, abstract data of the verification information, a forced verification identifier and a validity period of the verification information.
And S107, the account opening server determines whether to create a new account according to the decryption result and the account opening data.
More specifically, fig. 3 is a further explanation of S107.
In the account opening method provided by this embodiment, the client sends the account opening information to the verification server, and the verification server verifies the account opening information to obtain a verification result. The verification server encrypts the verification result and sends the encrypted verification result to the client. And the client sends the encrypted verification result and the account opening data to the account opening server. And the account opening server decrypts the encrypted result to obtain a decrypted result, and determines whether to create a new account according to the decrypted result and the account opening data. The number of repeated checks of account opening information is reduced, the account opening process is simplified, and account opening efficiency is improved.
Fig. 3 is a flowchart illustrating an account opening method according to another exemplary embodiment of the present invention. As shown in fig. 3, the account opening server determines whether to create a new account according to the decryption result and the account opening data, which specifically includes:
s201, the account opening server obtains the decryption result and the account opening data.
More specifically, the account opening server receives an account opening application sent from the client, wherein the account opening application comprises an encryption verification result and account opening data. And decrypting the encrypted result by using the key to obtain a decrypted result, wherein the decrypted result comprises a verification result, abstract data of verification information, a forced verification identifier and a validity period of the verification information, and the verification result comprises verification passing and verification failure.
S202, when the account opening server decryption result indicates that the verification is passed, a new account is created according to the account opening data.
S203, when the account opening server decryption result indicates that the verification fails, first prompt information of account opening failure is sent.
More specifically, the account opening server sends a first prompt message of the account opening failure to the client, wherein the first prompt message includes a specific reason of the authentication failure.
In the account opening method provided in this embodiment, the account opening server creates a new account according to the account opening data if the verification result is that the verification is passed according to the verification result in the decryption result. And if the verification result is verification failure, the account opening server sends first prompt information to the client. The account opening server does not need to call the independent service system again to check the account opening information, and the response speed of the account opening server is increased.
Fig. 4 is a flowchart illustrating an account opening method according to yet another exemplary embodiment of the present invention. As shown in fig. 4, before the account opening server determines whether the decryption result indicates that the verification passes, the account opening method further includes:
s301, the account opening server obtains the decryption result and the account opening data.
The manner of acquiring the decryption result and the account opening data by the account opening server is the same as S201 in the embodiment shown in fig. 3, and is not described herein again.
S302, the account opening server judges whether the validity period of the decryption result is within a preset time limit.
More specifically, the decryption result includes a validity period of the verification information, and the preset period may be set to H hours, M minutes, and S seconds of the nth day after the current day.
And S303, if so, the account opening server acquires the forced verification identifier in the decryption result.
More specifically, the validity period of the decryption result is within a preset period, which represents that the verification information is valid. And the account opening server acquires the forced verification identifier in the decryption result.
And S304, if not, the account opening server sends second prompt information indicating that the verification result is invalid to the client.
More specifically, the validity period of the decryption result is not within the preset time limit, and the account opening server sends second prompt information indicating that the verification result is invalid to the client. The second prompt message shows that the validity period of the decryption result is not within the preset period, and the account opening server can submit the data to be verified to the verification server for verification.
S305, after step 303, the account opening server determines whether the forced authentication flag indicates forced re-authentication.
More specifically, the decryption result includes a forced authentication identifier, and the account opening server determines whether the forced authentication identifier indicates forced re-authentication.
S306, if yes, the account opening server sends account opening data to the verification server so that the verification server can continuously verify the account opening data.
More specifically, the forced authentication identifier indicates forced re-authentication, and the account opening server ignores the authentication result in the decryption result regardless of the authentication result of the encrypted information, and forcibly submits the data to be authenticated to the authentication server for authentication.
And S307, if not, the account opening server acquires the abstract data of the account opening data.
More specifically, if the forced authentication flag does not indicate forced re-authentication, the account opening server obtains summary data of the account opening data.
S308, the account opening server judges that the summary data of the account opening data is matched with the summary data of the verification information in the encrypted verification result.
And S309, if yes, the account opening server judges whether the decryption result indicates that the verification is passed.
More specifically, the summary data of the account opening data and the summary information of the authentication information in the encrypted authentication result are successfully matched, and the account opening server performs S201 to S203 in fig. 3.
And S310, if not, the account opening server sends third prompt information indicating that the data is incomplete to the client.
More specifically, when the summary data of the account opening data fails to match with the summary information of the verification information in the encrypted verification result, the account opening server sends third prompt information indicating that the data is incomplete to the client.
For example, the account opening server may prompt the invalidation of the account opening data.
In the account opening method provided by this embodiment, the account opening server obtains a response after use, and the account opening server decrypts the encrypted result of the verification server using the key to obtain a decrypted result, where the decrypted result includes the verification result, digest data of the verification information, the mandatory verification identifier, and the validity period of the verification information. The account opening server judges each data in the decryption result, and the validity and the accuracy of account opening information are guaranteed.
Fig. 5 is a flowchart illustrating an account opening method according to still another exemplary embodiment of the present invention. As shown in fig. 5, before decrypting the encrypted verification result using the key to obtain a decrypted result, the account opening method further includes:
s401, the account opening server sends the public key.
More specifically, the account opening server sends the public key to the authentication server.
S402, the authentication server encrypts the key by using the public key to obtain an encryption key.
More specifically, the authentication server generates a key string at a certain time period, and the old key string automatically expires. The verification server receives the public key sent by the account opening server, and can also actively request to obtain the public key of the account opening server, and the public key is used for encrypting the secret key to obtain an encryption secret key.
S403, the authentication server sends the encryption key.
More specifically, the authentication server transmits the encryption key and the validity period of the key to the account opening server together.
Optionally, before the account opening server receives the encryption key sent by the authentication server, the account opening method further includes:
and the account opening server judges whether the validity period of the acquired key exceeds a preset period. And if so, sending a key application to the verification server, wherein the key application is used for acquiring the key.
For example, if the validity period of the key exceeds a preset period, which indicates that the key of the key string locally stored in the account opening server is expired, the account opening server obtains the encrypted key string from the verification server again, and updates the key and the validity period of the key. And the validity period of the secret key is within a preset time limit, which indicates that the secret key of the secret key character string stored locally in the account opening server is not expired, and the account opening server uses the private key for decryption.
S404, the account opening server decrypts the encrypted key by using the private key to obtain the key.
More specifically, the account opening server decrypts the encryption key using its own private key, obtains the currently valid available key string, and updates the validity period of the key.
In the account opening method provided by the embodiment, the security of account opening information is ensured by encrypting and transmitting user data.
Fig. 6 is a schematic structural diagram of an account opening device 500 according to an exemplary embodiment of the present invention. As shown in fig. 6, an account opening apparatus 500 provided in the embodiment of the present application is applied to an account opening server, and includes:
the receiving module 501 is configured to receive an account opening application sent by a client, where the account opening application includes an encrypted verification result and account opening data, and the encrypted verification result is obtained by performing verification processing on the account opening data by a verification server;
a processing module 502, configured to decrypt the encrypted verification result using a key to obtain a decrypted result, where the key is received from the verification server;
the processing module 502 is further configured to determine whether to create a new account according to the decryption result and the account opening data.
Optionally, the processing module 502 is specifically configured to:
judging whether the decryption result indicates that the verification is passed;
if yes, creating a new account according to the account opening data;
if not, first prompt information of account opening failure is sent to the client.
Optionally, the processing module 502 is further configured to:
judging whether the validity period of the decryption result is within a preset time limit or not;
if yes, continuously judging whether the decryption result indicates that the verification is passed;
and if not, sending second prompt information indicating that the verification result is invalid to the client.
Optionally, the processing module 502 is further configured to:
acquiring a forced verification identifier in a decryption result;
judging whether the mandatory verification identifier indicates mandatory re-verification;
if so, sending account opening data to the verification server so that the verification server continues to verify the account opening data;
if not, whether the decryption result indicates that the verification is passed or not is continuously judged.
Optionally, the processing module 502 is further configured to:
acquiring abstract data of account opening data;
judging whether the summary data of the account opening data is matched with the summary data of the verification information in the encrypted verification result;
if yes, continuously judging whether the decryption result indicates that the verification is passed;
and if not, sending third prompt information indicating that the data is incomplete to the client.
Optionally, the processing module 502 is further configured to:
receiving an encryption key sent by a verification server, wherein the encryption key is encrypted by using a public key, and the public key and a private key are a pair of asymmetric keys;
and decrypting the encrypted key by using the private key to obtain the key.
Optionally, the processing module 502 is further configured to:
judging whether the validity period of the acquired key exceeds a preset time limit or not;
and if so, sending a key application to the verification server, wherein the key application is used for acquiring the key.
Fig. 7 is a schematic structural diagram of an account opening apparatus 600 according to another exemplary embodiment of the present invention. As shown in fig. 7, an account opening apparatus 600 provided in the embodiment of the present application is applied to an authentication server, and includes:
a receiving module 601, configured to receive account opening data sent by a client;
the processing module 602 is configured to perform verification processing on the account opening data to obtain a verification result;
the processing module 602 is further configured to encrypt the verification result using the key to obtain an encrypted verification result;
the sending module 603 is configured to return the encryption verification result to the client, so that the client generates an account opening application according to the encryption verification result and the account opening data, so that the account opening server obtains a decryption result according to the account opening application and a key received from the verification server, and determines whether to create a new account according to the decryption result and the account opening data.
Optionally, the processing module 602 is further configured to:
and adding attribute data to the verification result, wherein the attribute data comprises one or more combinations of a valid system, a forced verification identifier and summary data of the verification information.
Optionally, the receiving module 601 is further configured to receive a public key sent by the account opening server;
the processing module 602 is further configured to encrypt the key using the public key to obtain an encryption key;
the sending module 603 is further configured to send the encryption key to the account opening server.
Optionally, the processing module 602 is further configured to:
judging whether the validity period of the secret key exceeds a preset time limit or not;
if yes, the key is updated.
Fig. 8 is a schematic diagram illustrating a hardware configuration of the server 70 according to an exemplary embodiment of the present invention. As shown in fig. 8, the server 70 of the present embodiment includes: a memory 72 and a processor 71; wherein the content of the first and second substances,
a memory 72 for storing computer-executable instructions;
a processor 71, configured to execute the computer-executable instructions stored in the memory, to implement the steps performed by the server in the above embodiments. Reference may be made in particular to the description relating to the method embodiments described above.
Alternatively, the memory 72 may be separate or integrated with the processor 71.
When the memory 72 is separately provided, the server 70 further includes a bus 73 for connecting the memory 72 and the processor 71.
The embodiment of the invention also provides a computer-readable storage medium, wherein the computer-readable storage medium stores computer execution instructions, and when the processor executes the computer execution instructions, the account opening method executed by the electronic device is realized.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (15)

1. An account opening method applied to an account opening server comprises the following steps:
receiving an account opening application sent by a client, wherein the account opening application comprises an encrypted verification result and account opening data, and the encrypted verification result is obtained by verifying the account opening data by a verification server;
decrypting the encrypted verification result by using a key to obtain a decrypted result, wherein the key is received from the verification server;
and determining whether to create a new account according to the decryption result and the account opening data.
2. The account opening method according to claim 1, wherein determining whether to create a new account according to the decryption result and the account opening data specifically includes:
judging whether the decryption result indicates that the verification is passed;
if yes, creating a new account according to the account opening data;
if not, sending first prompt information of account opening failure to the client.
3. An account opening method according to claim 2, wherein before determining whether the decryption result indicates that the verification is passed, the method further comprises:
judging whether the validity period of the decryption result is within a preset time limit or not;
if yes, continuously judging whether the decryption result indicates that the verification is passed;
and if not, sending second prompt information indicating that the verification result is invalid to the client.
4. An account opening method according to claim 2, wherein before determining whether the decryption result indicates that the verification is passed, the method further comprises:
acquiring a forced verification identifier in the decryption result;
judging whether the mandatory authentication identifier indicates mandatory re-authentication;
if yes, sending account opening data to the verification server so that the verification server can continuously verify the account opening data;
if not, continuously judging whether the decryption result indicates that the verification is passed.
5. An account opening method according to claim 2, wherein before determining whether the decryption result indicates that the verification is passed, the method further comprises:
acquiring abstract data of the account opening data;
judging whether the summary data of the account opening data is matched with the summary data of the verification information in the encryption verification result;
if yes, continuously judging whether the decryption result indicates that the verification is passed;
and if not, sending third prompt information indicating that the data is incomplete to the client.
6. An account opening method according to claim 1, wherein before decrypting the encrypted verification result using the key to obtain a decrypted result, the method further comprises:
receiving an encryption key sent by a verification server, wherein the encryption key is encrypted by using a public key, and the public key and a private key are a pair of asymmetric keys;
and decrypting the encryption key by using a private key to obtain the key.
7. An account opening method according to claim 6, wherein before receiving the encryption key sent by the authentication server, the method further comprises:
judging whether the validity period of the acquired key exceeds a preset period;
and if so, sending a key application to the verification server, wherein the key application is used for acquiring the key.
8. An account opening method applied to a verification server comprises the following steps:
receiving account opening data sent by a client;
verifying the account opening data to obtain a verification result;
encrypting the verification result by using a secret key to obtain an encrypted verification result;
and returning an encryption verification result to the client so that the client generates an account opening application according to the encryption verification result and the account opening data, so that the account opening server obtains a decryption result according to the account opening application and a key received from the verification server, and determines whether to create a new account according to the decryption result and the account opening data.
9. The account opening method of claim 8, wherein after the account opening data is verified, before a verification result is obtained, the method further comprises:
and adding attribute data to the verification result, wherein the attribute data comprises one or more combinations of a validity period, a mandatory verification identifier and summary data of verification information.
10. An account opening method according to claim 8, wherein the method further comprises:
receiving a public key sent by an account opening server;
encrypting the key by using a public key to obtain an encryption key;
and sending an encryption key to the account opening server.
11. An account opening method according to claim 8, wherein the method further comprises:
judging whether the validity period of the secret key exceeds a preset time limit or not;
and if so, updating the key.
12. A server, comprising: a memory and a processor;
a memory; a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the account opening method of any of claims 1 to 7.
13. A server, comprising: a memory and a processor;
a memory; a memory for storing the processor-executable instructions;
wherein the processor is configured to perform the account opening method of any of claims 8 to 11.
14. An account opening system, comprising: an account opening server as claimed in claim 12, a verification server as claimed in claim 13 and a client.
15. A computer-readable storage medium having stored thereon computer-executable instructions for implementing the account opening method of any one of claims 1 to 7 or any one of claims 8 to 10 when executed by a processor.
CN202011203550.5A 2020-11-02 2020-11-02 Account opening method, server, system and storage medium Active CN112383912B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011203550.5A CN112383912B (en) 2020-11-02 2020-11-02 Account opening method, server, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011203550.5A CN112383912B (en) 2020-11-02 2020-11-02 Account opening method, server, system and storage medium

Publications (2)

Publication Number Publication Date
CN112383912A CN112383912A (en) 2021-02-19
CN112383912B true CN112383912B (en) 2022-08-02

Family

ID=74576556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011203550.5A Active CN112383912B (en) 2020-11-02 2020-11-02 Account opening method, server, system and storage medium

Country Status (1)

Country Link
CN (1) CN112383912B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883260A (en) * 2015-06-11 2015-09-02 深圳市易普森科技有限公司 Certificate information processing and verification methods, processing terminal, and verification server
CN105471833A (en) * 2015-05-14 2016-04-06 瑞数信息技术(上海)有限公司 Safe communication method and device
US9692757B1 (en) * 2015-05-20 2017-06-27 Amazon Technologies, Inc. Enhanced authentication for secure communications
KR101862209B1 (en) * 2018-01-31 2018-07-04 (주)유엠브이기술 Contents security system based on Open Trusted Execution Environment and the method thereof
EP3439230A1 (en) * 2016-03-30 2019-02-06 Alibaba Group Holding Limited Method and device for registering biometric identity and authenticating biometric identity
CN109495445A (en) * 2018-09-30 2019-03-19 青岛海尔科技有限公司 Identity identifying method, device, terminal, server and medium based on Internet of Things

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4748774B2 (en) * 2004-06-02 2011-08-17 キヤノン株式会社 Encrypted communication system and system
US9774591B2 (en) * 2014-10-15 2017-09-26 Airbnb, Inc. Password manipulation for secure account creation and verification through third-party servers

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471833A (en) * 2015-05-14 2016-04-06 瑞数信息技术(上海)有限公司 Safe communication method and device
US9692757B1 (en) * 2015-05-20 2017-06-27 Amazon Technologies, Inc. Enhanced authentication for secure communications
CN104883260A (en) * 2015-06-11 2015-09-02 深圳市易普森科技有限公司 Certificate information processing and verification methods, processing terminal, and verification server
EP3439230A1 (en) * 2016-03-30 2019-02-06 Alibaba Group Holding Limited Method and device for registering biometric identity and authenticating biometric identity
KR101862209B1 (en) * 2018-01-31 2018-07-04 (주)유엠브이기술 Contents security system based on Open Trusted Execution Environment and the method thereof
CN109495445A (en) * 2018-09-30 2019-03-19 青岛海尔科技有限公司 Identity identifying method, device, terminal, server and medium based on Internet of Things

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于加密短信验证码的移动安全支付解决方案;李赛等;《计算机应用》;20170810(第08期);全文 *

Also Published As

Publication number Publication date
CN112383912A (en) 2021-02-19

Similar Documents

Publication Publication Date Title
EP3557831B1 (en) System for processing two-dimensional barcodes in connection with mobile payment transactions
CN109359691B (en) Identity verification method and system based on block chain
CN107948204B (en) One-key login method and system, related equipment and computer readable storage medium
EP3709567B1 (en) Electronic signature authentication system on the basis of biometric information and electronic signature authentication method thereof
CN108834144B (en) Method and system for managing association of operator number and account
JP2019519827A (en) Two-channel authentication agent system and method capable of detecting false alteration of application
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
CN108418812B (en) Intelligent terminal safety message service method based on trusted execution environment
CN105427099A (en) Network authentication method for secure electronic transactions
JP2003521154A (en) How to issue electronic identification information
CN110278180B (en) Financial information interaction method, device, equipment and storage medium
CN111130798B (en) Request authentication method and related equipment
CN105577619B (en) Client login method, client and system
CN112232814A (en) Encryption and decryption method of payment key, payment authentication method and terminal equipment
KR20150011305A (en) Biometric authentication electronic signature registration methods using an instant messenger
CN112448930A (en) Account registration method, device, server and computer readable storage medium
CN113763621A (en) Access control authorization method, management client and system based on block chain
CN108566389B (en) Cross-application fingerprint identity authentication method and device
CN114501431A (en) Message transmission method and device, storage medium and electronic equipment
CN107171814A (en) A kind of digital certificate updating method and device
KR20110055091A (en) Letter message security service system and the use method
CN112383912B (en) Account opening method, server, system and storage medium
CN115378609A (en) Electronic certificate display method, verification method, terminal and server
CN115459929A (en) Security verification method, apparatus, electronic device, system, medium, and product
KR101582861B1 (en) Method for authenticating user and authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant