CN113068155A - Service provisioning method and server - Google Patents

Service provisioning method and server Download PDF

Info

Publication number
CN113068155A
CN113068155A CN202110320079.6A CN202110320079A CN113068155A CN 113068155 A CN113068155 A CN 113068155A CN 202110320079 A CN202110320079 A CN 202110320079A CN 113068155 A CN113068155 A CN 113068155A
Authority
CN
China
Prior art keywords
information
value
terminal
authenticated
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110320079.6A
Other languages
Chinese (zh)
Inventor
肖征荣
张猛
邢建兵
田新雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202110320079.6A priority Critical patent/CN113068155A/en
Publication of CN113068155A publication Critical patent/CN113068155A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/50Service provisioning or reconfiguring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a service opening method and a server, and relates to the technical field of communication. The service opening method comprises the following steps: acquiring information to be verified of a terminal to be authenticated, wherein the information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information; determining a weight value corresponding to the information to be verified according to the information to be verified; determining an authentication value according to the information to be verified and the corresponding weight value; judging whether the terminal to be authenticated passes authentication or not according to the authentication value and a preset authentication threshold value; and opening the on-line service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication. The method and the device ensure that the user can complete the opening of the online service in a self-service and safe manner, and improve the user experience.

Description

Service provisioning method and server
Technical Field
The present application relates to the field of communications technologies, and in particular, to a service provisioning method and a server.
Background
At present, with the rapid development of the mobile internet and the development of the communication industry, the demand of users is also continuously increasing. The user can open an account on line fast and automatically through the mobile internet, and the user can complete real-name authentication through the mobile internet, so that the inconvenience that the user goes to an off-line business hall to handle business is avoided.
However, in the process of opening an account online, after the user selects the number, the user is required to upload the front/back photos of the identity card, and then the user is subjected to live body verification to determine whether the user transacts the business. However, when the identity information is transmitted on the network, sensitive information is easily leaked, the security of the identity information of the user cannot be guaranteed, and the difference between the picture on the identity card and the user causes verification failure, so that the user cannot open related services on line by self.
Disclosure of Invention
Therefore, the application provides a service provisioning method and a server, and the problem of how to improve the comprehensiveness and safety of the information of the service provisioning on the line is solved.
In order to achieve the above object, a first aspect of the present application provides a service provisioning method, where the method includes: acquiring information to be verified of a terminal to be authenticated, wherein the information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information; determining a weight value corresponding to the information to be verified according to the information to be verified; determining an authentication value according to the information to be verified and the corresponding weight value; judging whether the terminal to be authenticated passes authentication or not according to the authentication value and a preset authentication threshold value; and opening the on-line service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication.
In some specific implementations, after determining the weight value corresponding to the information to be verified according to the information to be verified, before determining the authentication value according to the information to be verified and the weight value corresponding to the information to be verified, the method further includes: determining at least two of a video characteristic value, a voice recognition characteristic value, a call record characteristic value, a short message record characteristic value and a position characteristic value by adopting the following modes: determining a video characteristic value according to the video information; determining a voice recognition characteristic value according to the voice recognition information; determining a call record characteristic value according to the call record information; determining a short message record characteristic value according to the short message record information; and determining a position characteristic value according to the position information.
In some specific implementations, the video information includes identity information of a user corresponding to the terminal to be authenticated and identity information of a registered user of the terminal to be authenticated; determining a video feature value according to video information, comprising: and determining the video characteristic value according to the identity information of the registered user and the identity information of the user.
In some implementations, the voice recognition information includes voice information of a user corresponding to the terminal to be authenticated and voice information of a registered user of the terminal to be authenticated; determining a speech recognition feature value according to the speech recognition information, comprising: comparing the voice information of the user with the voice information of the registered user, and determining a voice comparison result; and determining a voice recognition characteristic value according to the voice comparison result.
In some implementations, the location information represents information of a geographic location where the terminal to be authenticated is located; determining a location feature value from the location information, comprising: acquiring registered cell information of a terminal to be authenticated, wherein the registered cell information comprises an identifier of a registered cell and position information corresponding to the registered cell; and determining the position characteristic value according to the information of the geographical position of the terminal to be authenticated and the position information corresponding to the registration cell.
In some specific implementations, the call record information includes a call record to be verified of the terminal to be authenticated within a preset time and a history call record of the terminal to be authenticated; determining a call record characteristic value according to the call record information, comprising: and comparing the call record to be verified with the historical call record, and determining the characteristic value of the call record.
In some implementations, the video feature value, the voice recognition feature value, the call record feature value, the short message record feature value, and the location feature value are real numbers within a preset value range.
In some implementations, determining the authentication value according to the information to be verified and the weight value corresponding to the information to be verified includes: and determining an authentication value according to at least two of the video characteristic value and the corresponding weight value thereof, the voice recognition characteristic value and the corresponding weight value thereof, the call record characteristic value and the corresponding weight value thereof, the short message record characteristic value and the corresponding weight value thereof, and the position characteristic value and the corresponding weight value thereof.
In order to achieve the above object, a second aspect of the present application provides a server comprising: the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring information to be verified of a terminal to be authenticated, and the information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information; the weight value determining module is used for determining a weight value corresponding to the information to be verified according to the information to be verified; the authentication value determining module is used for determining an authentication value according to the information to be verified and the weight value corresponding to the information to be verified; the judging module is used for judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value; and the service opening module is used for opening a preset service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication.
In some implementations, the server further includes: the characteristic value determining module is used for determining at least two of a video characteristic value, a voice recognition characteristic value, a call record characteristic value, a short message record characteristic value and a position characteristic value; the video characteristic value is a characteristic value determined according to video information, the voice recognition characteristic value is a characteristic value determined according to voice recognition information, the call record characteristic value is a characteristic value determined according to call record information, the short message record characteristic value is a characteristic value determined according to short message record information, and the position characteristic value is a characteristic value determined according to position information.
According to the service opening method and the server, the weight value corresponding to the information to be verified is determined according to the acquired information to be verified of the terminal to be authenticated, wherein the information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information, the influence degree of the information to be verified with different dimensionalities on the terminal to be verified is determined, and the comprehensiveness of the information to be verified is ensured; determining an authentication value according to the information to be verified and the corresponding weight value thereof, and ensuring the comprehensiveness of the authentication value; judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value, determining the information security of the terminal to be authenticated, and improving the authentication success rate of the terminal to be authenticated; and under the condition that the terminal to be authenticated is confirmed to pass the authentication, the on-line service is opened for the terminal to be authenticated, so that the user can complete the opening of the on-line service safely by self, and the user experience is improved.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. The above and other features and advantages will become more apparent to those skilled in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 shows a schematic flow chart of a service provisioning method in an embodiment of the present application.
Fig. 2 is a schematic flow chart illustrating a service provisioning method in another embodiment of the present application.
Fig. 3 shows a block diagram of the components of the server in the embodiment of the present application.
Fig. 4 shows a block diagram of a service provisioning system in the embodiment of the present application.
Fig. 5 is a schematic flow chart illustrating a working method of the service provisioning system in the embodiment of the present application.
In the drawings:
301: the obtaining module 302: weight value determination module
303: authentication value determination module 304: judging module
305: the service provisioning module 401: terminal to be authenticated
402: the accessory device 403: service provisioning server
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
In the technical solution according to the present application, the acquisition of the personal information data of the user complies with the relevant national laws and regulations (e.g., "information security technology personal information security regulations"). Moreover, the information acquisition mode is that the user is explicitly informed, and a legal way is passed; the type of the obtained information is directly related to the service function of the product or service, and the obtained information is collected with the lowest frequency and the minimum quantity; collecting personal information without violating the autonomous will of the personal information subject; obtaining authorization approval when collecting personal information; when the personal information is obtained indirectly, or a data set is disclosed for a network, or obtained in other ways, and the specification requirement of obtaining the indirect personal information is met.
In the technical solution according to the present application, the storage of the user personal information data complies with the relevant national laws and regulations (e.g., "information security technology personal information security regulations"). If the technical scheme involves some specific operations as follows, the following corresponding processing modes can be further selected: personal information storage time is minimized; the personal information has been subjected to a de-identification process; encrypting and storing the personal sensitive information; the personal biological information and the personal identity information are stored separately; the original personal biometric information is not stored, such as only the digest information is stored, or only used, or deleted after use.
The technical scheme is characterized in that the use of the user data follows the relevant national laws and regulations (such as personal information safety regulations of information safety technology). Such as: the personal information access control takes corresponding prescribed measures; the display of personal information gives regulatory restrictions; the personal information use purpose is not beyond the direct or reasonable association range; and when the personal information is used, the definite identity directivity is eliminated, and the specific individual is prevented from being accurately positioned.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 shows a schematic flow chart of a service provisioning method in an embodiment of the present application. The service provisioning method can be applied to a server, for example: a service provisioning server of an operator, and the like. As shown in fig. 1, the service provisioning method includes the following steps:
step S101, obtaining information to be verified of a terminal to be authenticated.
The information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information.
For example, the video information includes information such as a preset character string or text information read by a user of the terminal to be authenticated. The text message may include the identity information of the user. The video information may further include pre-stored video information of registered users of the terminals to be authenticated. The voice recognition information includes voice information recorded by a user of the terminal to be authenticated (e.g., audio information that the user regularly records within a preset time period according to system settings, and the user reads a certain random number or text). The voice recognition information may also include voice information of a registered user of the terminal to be authenticated. The call log information includes call log information of the user of the terminal to be authenticated within a certain period of time (e.g., the first 10 minutes from the current time) and history call log information of the terminal to be authenticated. The short message record information comprises the short message record information of the user of the terminal to be authenticated and the historical short message record information of the terminal to be authenticated. The location information includes the current location information of the terminal to be authenticated and the pre-stored geographical location information of the terminal to be authenticated within a preset time period (for example, the last 10 minutes). The geographic location information may also be latitude and longitude information and the like.
Step S102, determining a weight value corresponding to the information to be verified according to the information to be verified.
The weight value represents a numerical value of a specific gravity occupied by each different type of information in the information to be verified. For example, if a certain information in the information to be verified has a large influence on the terminal to be authenticated, the corresponding weight value will be relatively large.
Step S103, according to the information to be verified and the corresponding weight value, an authentication value is determined.
The information to be verified can be at least two of video information, voice recognition information, call recording information, short message recording information and position information. The weight value corresponding to each kind of information to be verified is different.
The authentication value is determined through various different information to be verified and the corresponding weight values of the information to be verified, the authentication value of the terminal to be verified can be confirmed from multiple dimensions, and the comprehensiveness of authentication is guaranteed.
And step S104, judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value.
The preset authentication threshold is a threshold set in advance according to a historical experience value, for example, 100%. When the authentication value is larger than a preset authentication threshold value, determining that the terminal to be authenticated passes authentication; otherwise, when the authentication value is smaller than or equal to the preset authentication threshold value, the terminal to be authenticated can be determined not to pass the authentication.
And step S105, opening an on-line service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication.
The online service includes a network call function in a fifth Generation Mobile communication network (5th Generation Mobile Networks, 5G), a color ring service, a video call service in a fourth Generation Mobile communication network (4th Generation Mobile Networks, 4G), and the like. The above online services are only examples, and may be specifically set according to actual situations, and other online services not described are also within the protection scope of the present application, and are not described herein again.
In this embodiment, a weight value corresponding to information to be verified is determined according to the acquired information to be verified of the terminal to be authenticated, wherein the information to be verified includes at least two of video information, voice recognition information, call recording information, short message recording information and position information, the influence degree of the information to be verified with different dimensions on the terminal to be verified is determined, and the comprehensiveness of the information to be verified is ensured; determining an authentication value according to the information to be verified and the corresponding weight value thereof, and ensuring the comprehensiveness of the authentication value; judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value, determining the information security of the terminal to be authenticated, and improving the authentication success rate of the terminal to be authenticated; and under the condition that the terminal to be authenticated is confirmed to pass the authentication, the on-line service is opened for the terminal to be authenticated, so that the user can complete the opening of the on-line service safely by self, and the user experience is improved.
Fig. 2 is a schematic flow chart illustrating a service provisioning method in another embodiment of the present application. The service opening method can be applied to a service opening server of an operator. As shown in fig. 2, the service provisioning method includes the following steps:
step S201, obtaining information to be verified of the terminal to be authenticated.
Step S202, according to the information to be verified, determining a weight value corresponding to the information to be verified.
It should be noted that steps S201 to S202 in this embodiment are the same as steps S101 to S102 in the previous embodiment, and are not repeated herein.
Step S203, determining at least two of the video characteristic value, the voice recognition characteristic value, the call record characteristic value, the short message record characteristic value and the position characteristic value by adopting the following modes: determining a video characteristic value according to the video information; determining a voice recognition characteristic value according to the voice recognition information; determining a call record characteristic value according to the call record information; determining a short message record characteristic value according to the short message record information; and determining a position characteristic value according to the position information.
The video characteristic value, the voice recognition characteristic value, the call record characteristic value, the short message record characteristic value and the position characteristic value are real numbers in a preset value range. For example, real numbers within a preset value range are real numbers greater than or equal to-1 and less than or equal to 1.
In some specific implementations, the video information includes identity information of a user corresponding to the terminal to be authenticated and identity information of a registered user of the terminal to be authenticated; determining a video feature value according to video information, comprising: and determining the video characteristic value according to the identity information of the registered user and the identity information of the user.
For example, a video comparison result can be generated by comparing the identity information of the registered user with the identity information of the user, a video characteristic value is determined according to the video comparison result, and whether the user is the registered user is determined by using the video characteristic value, because the video information may have a certain error, the video characteristic value can be a real number which is greater than or equal to-1 and less than or equal to 1, the difference degree between the user and the registered user is represented by the video characteristic value, the video information is quantitatively analyzed, and the accuracy of the video characteristic value is improved.
It should be noted that, if the video feature value is greater than a preset threshold value (for example, 100%), it may be determined that the registered user is performing service activation by himself; otherwise, it may be determined that the terminal to be authenticated has a possibility of being misoperated by a third party, and further verification of other information of the terminal to be authenticated is required to be continued.
In some implementations, the voice recognition information includes voice information of a user corresponding to the terminal to be authenticated and voice information of a registered user of the terminal to be authenticated; determining a speech recognition feature value according to the speech recognition information, comprising: comparing the voice information of the user with the voice information of the registered user, and determining a voice comparison result; and determining a voice recognition characteristic value according to the voice comparison result.
The voice information of the user can be audio information which is recorded at regular time within a preset time length and is obtained by reading a certain random number or character by the user of the terminal to be authenticated; the voice information of the registered user may be the voice information of the registered user recorded by the registered user according to the requirement of the operator when the terminal to be authenticated is registered.
By comparing the voice information of the user with the voice information of the registered user and determining the voice comparison result, whether the voices of the user and the voice of the registered user are the same or not can be determined, and further whether the registered user himself/herself carries out service opening or not is determined, and the safety of the terminal to be authenticated is guaranteed.
In some implementations, the location information represents information of a geographic location where the terminal to be authenticated is located; determining a location feature value from the location information, comprising: acquiring registered cell information of a terminal to be authenticated, wherein the registered cell information comprises an identifier of a registered cell and position information corresponding to the registered cell; and determining the position characteristic value according to the information of the geographical position of the terminal to be authenticated and the position information corresponding to the registration cell.
Wherein, the identity of the registration Cell includes a Physical Cell Identity (PCI); the location information corresponding to the registration cell may be pre-stored geographic location information (e.g., registered 5G/4G cellular cell information, etc.) of the terminal to be authenticated within a preset time period (e.g., the last 10 minutes), or may also be latitude and longitude information of the registration cell, where the location information corresponding to the registration cell is merely an example, and may be specifically set according to actual needs, and the location information corresponding to other non-described registration cells is also within the protection range of the present application, and is not described herein again.
For example, the location characteristic value may be determined by comparing the information of the geographic location where the terminal to be authenticated is located with the location information corresponding to the registration cell, and the location characteristic value represents whether the terminal to be authenticated is within the service range of the registration cell, so as to ensure that the terminal to be authenticated can receive the communication signal of the registration cell, and ensure that the terminal to be authenticated is within the safe use range.
In some specific implementations, the call record information includes a call record to be verified of the terminal to be authenticated within a preset time and a history call record of the terminal to be authenticated; determining a call record characteristic value according to the call record information, comprising: and comparing the call record to be verified with the historical call record, and determining the characteristic value of the call record.
The history call record information includes call record information of the terminal to be authenticated within a certain time (for example, three months), for example, information of the number of calls of the terminal to be authenticated within the past three months, the call time of each call, the calling/called number of each call, and the like. The call record information to be verified comprises call duration to be verified, a calling/called number of a call to be verified and the like.
For example, by using the calling/called number of the call to be verified in the call record information to be verified as an index, historical call record information can be searched, whether the terminal to be authenticated has ever communicated with the calling/called number is determined, a call record characteristic value is determined, and further whether the terminal to be authenticated has a call with a familiar number can be determined according to the call record characteristic value, so that a third party is prevented from embezzlement of the terminal to be authenticated, and the security of the terminal to be authenticated is improved.
In some specific implementations, the determining the short message record characteristic value according to the short message record information includes: and searching historical short message record information corresponding to the terminal to be authenticated according to the identifier of the terminal to be authenticated, and determining a short message record characteristic value.
Whether the terminal to be authenticated receives the short message which is sent by any one or more of banks, intelligent organizations or operators and is related to the personal information of the user of the terminal to be authenticated within a preset time (for example, the last 30 minutes) is determined through the short message recording characteristic value, whether the personal information of the user is consistent with the personal information of the registered user of the terminal to be authenticated is determined, the user of the terminal to be authenticated is ensured to be consistent with the registered user, abuse of the terminal to be authenticated is avoided, and the safety of the terminal to be authenticated is improved.
Step S204, according to the information to be verified and the corresponding weight value, an authentication value is determined.
In some implementations, determining the authentication value according to the information to be verified and the weight value corresponding to the information to be verified includes: and determining an authentication value according to at least two of the video characteristic value and the corresponding weight value thereof, the voice recognition characteristic value and the corresponding weight value thereof, the call record characteristic value and the corresponding weight value thereof, the short message record characteristic value and the corresponding weight value thereof, and the position characteristic value and the corresponding weight value thereof.
The video characteristic value corresponds to a video weight value, the voice recognition characteristic value corresponds to a voice weight value, the call record characteristic value corresponds to a call record weight value, the short message record characteristic value corresponds to a short message record weight value and the position characteristic value corresponds to a position weight value.
By adopting at least two of the different characteristic values and the corresponding weight values, the authentication value is determined, the accuracy of the authentication value can be confirmed from multiple dimensions, the authentication error of the terminal to be authenticated is avoided, and the safety of the terminal to be authenticated is improved.
Step S205, determining whether the terminal to be authenticated passes the authentication according to the authentication value and the preset authentication threshold.
And step S206, opening the on-line service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication.
It should be noted that steps S205 to S206 in this embodiment are the same as steps S104 to S105 in the previous embodiment, and are not repeated herein.
In the embodiment, the authentication value of the terminal to be authenticated is determined by adopting at least two of a video weight value corresponding to the video characteristic value, a voice weight value corresponding to the voice recognition characteristic value, a call record weight value corresponding to the call record characteristic value, a short message record weight value corresponding to the short message record characteristic value and a position weight value corresponding to the position characteristic value, so that the influence degree of information to be authenticated with different dimensions on the terminal to be authenticated can be determined, and the comprehensiveness of the authentication value is ensured; judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value, determining the information security of the terminal to be authenticated, and improving the authentication success rate of the terminal to be authenticated; and under the condition that the terminal to be authenticated is confirmed to pass the authentication, the on-line service is opened for the terminal to be authenticated, so that the user can complete the opening of the on-line service safely by self, and the user experience is improved.
Fig. 3 shows a block diagram of the components of the server in the embodiment of the present application. As shown in fig. 3, the server specifically includes the following modules:
the acquiring module 301 is configured to acquire to-be-verified information of a to-be-authenticated terminal, where the to-be-verified information includes at least two of video information, voice recognition information, call recording information, short message recording information, and location information; a weight value determining module 302, configured to determine, according to the information to be verified, a weight value corresponding to the information to be verified; an authentication value determining module 303, configured to determine an authentication value according to the information to be verified and the weight value corresponding to the information to be verified; the judging module 304 is configured to judge whether the terminal to be authenticated passes authentication according to the authentication value and a preset authentication threshold; the service provisioning module 305 is configured to provision a preset service for the terminal to be authenticated, when it is determined that the terminal to be authenticated passes authentication.
In some implementations, the server further includes: the characteristic value determining module is used for determining at least two of a video characteristic value, a voice recognition characteristic value, a call record characteristic value, a short message record characteristic value and a position characteristic value; the video characteristic value is a characteristic value determined according to video information, the voice recognition characteristic value is a characteristic value determined according to voice recognition information, the call record characteristic value is a characteristic value determined according to call record information, the short message record characteristic value is a characteristic value determined according to short message record information, and the position characteristic value is a characteristic value determined according to position information.
In this embodiment, a weight value corresponding to information to be verified is determined according to the information to be verified, which is obtained by a weight value determining module, of a terminal to be authenticated, wherein the information to be verified includes at least two of video information, voice recognition information, call recording information, short message recording information and position information, the degree of influence of the information to be verified with different dimensions on the terminal to be verified is determined, and the comprehensiveness of the information to be verified is ensured; determining an authentication value by using an authentication value determining module according to the information to be verified and the corresponding weight value thereof, and ensuring the comprehensiveness of the authentication value; the judging module is used for judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value, determining the information security of the terminal to be authenticated and improving the authentication success rate of the terminal to be authenticated; and opening the online service for the terminal to be authenticated by using the service opening module under the condition that the terminal to be authenticated is confirmed to pass the authentication, so that the user can complete the opening of the online service safely by self, and the user experience is improved.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
Fig. 4 shows a block diagram of a service provisioning system in the embodiment of the present application. As shown in fig. 4, the service provisioning system specifically includes the following devices: a terminal 401 to be authenticated, an accessory device 402 and a service provisioning server 403 of an operator.
The terminal 401 to be authenticated and the accessory device 402 can communicate with each other in a short-distance communication manner such as bluetooth or a mobile hotspot (Wi-Fi); the terminal 401 to be authenticated and the service provisioning server 403 of the operator can communicate with each other through the mobile internet.
Fig. 5 is a schematic flow chart illustrating a working method of the service provisioning system in the embodiment of the present application. As shown in fig. 5, the working method of the service provisioning system includes the following steps:
in step S501, the terminal 401 to be authenticated and the accessory device 402 (e.g., a smart watch) complete pairing.
Wherein the terminal 401 to be authenticated corresponds to the first identifier (ID1), the accessory device 402 corresponds to the second identifier (ID2), and since two different IDs (ID1 and ID2) belong to the same household, the terminal 401 to be authenticated and the accessory device 402 can share the location and resources (e.g., software purchased through a network, etc.).
In step S502, the accessory device 402 encrypts the accessory device information to generate encrypted accessory device information, and sends the encrypted accessory device information to the terminal device 401 through short-range communication methods such as bluetooth or mobile hotspot (Wi-Fi).
The accessory device information includes any one or more of a communication identifier of the accessory device 402 (e.g., IMSI of watch), a device identifier of the accessory device 402 (e.g., ID2, etc.), and second location information of the accessory device 402.
In step S503, the terminal 401 to be authenticated sends its own terminal information and the acquired accessory device information to the account opening system server 403 of the operator.
The terminal information includes any one or more of a communication identifier (e.g., IMSI, IMEI, etc.), an equipment identifier (e.g., ID1, etc.) and first location information corresponding to the terminal 401 to be authenticated.
In step S504, after the terminal 401 to be authenticated completes pairing operation with the accessory device 402, it sends an authentication request to the account opening system server 403 of the operator.
The authentication request includes an account opening request identifier and identity information (e.g., a front/back photo of an identity card, etc.) of a user corresponding to the terminal 401 to be authenticated.
It should be noted that, in order to ensure the comprehensiveness of the authentication of the terminal 401 to be authenticated, the account opening system server 403 may obtain information of multiple dimensions of the terminal 401 to be authenticated, for example, obtain at least two of video information, voice recognition information, call record information, short message record information, and location information of the terminal 401 to be authenticated.
Each kind of information corresponds to a different feature value, and a weight value corresponding to each kind of information also changes with the change of the information reported by the terminal to be authenticated 401, and the following steps S505 to S515 will describe in detail a processing manner of the account opening system server 403 on the acquired information of different dimensions of the terminal to be authenticated 401.
In step S505, the terminal 401 to be authenticated acquires video information of the user of the terminal 401 to be authenticated in response to the biometric authentication request sent by the account opening system server 403 of the operator.
In step S506, the terminal 401 to be authenticated sends the video information of the user to the account opening system server 403.
Step S507, the video information-to-account opening system server 403 analyzes the received video information of the user of the terminal 401 to be authenticated and the pre-stored video information of the registered user of the terminal 401 to be authenticated, and obtains a video characteristic value; and determining a video weight value corresponding to the video information according to the video information of the user.
For example, set video information pairThe corresponding feature vector is F1Video weight value of a1. By comparing the video information of the user with the video information of the registered user, a video comparison result can be obtained, and the video characteristic value F (F) can be determined according to the video comparison result1) The video feature value F (F)1) The value range of (a) is greater than or equal to-1 and less than or equal to 1. Wherein f represents the mapping relation between the video characteristic value and the preset video threshold, i.e. the video characteristic value is mapped to the preset value range [ -1, 1 [ -1 [ ]]And (4) the following steps.
Note that, the video weight value a1May vary with the user's video information. For example, in the case that the video information of the user is more inclined to the video information of the registered user of the terminal 401 to be authenticated, the video weight value a1And also with it. For example, set initial video weight value a1100%, if the video information of the user is the same as that of the registered user, the video weight value a1Increase by 10%, i.e. the video weight value a at that time1The content was 110%.
In step S508, the terminal 401 to be authenticated sends the voice information recorded by the user of the terminal 401 to be authenticated to the account opening system server 403.
Step S509, the account opening system server 403 analyzes the received voice information of the user of the terminal 401 to be authenticated and the pre-stored voice information of the registered user of the terminal 401 to be authenticated, and obtains a voice recognition feature value; and determining a voice weight value corresponding to the voice information according to the voice information of the user.
For example, a feature vector F corresponding to the voice information is set2The weighted value of speech is a2. By comparing the voice information of the user with the voice information of the registered user, a voice comparison result can be obtained, and the voice recognition characteristic value F (F) can be determined based on the voice comparison result2) The speech recognition feature value F (F)2) The value range of (a) is greater than or equal to-1 and less than or equal to 1. Wherein f represents the mapping relation between the speech recognition characteristic value and the preset speech threshold value, i.e. the speech recognition characteristic value is mapped to the preset value range [ -1, 1 [ -1 [ ]]And (4) the following steps.
Note that the speech weight value a2Can be changed along with the change of the voice information of the user. For example, in the case that the voice information of the user is more inclined to the voice information of the registered user of the terminal 401 to be authenticated, the voice weight value a2And also with it. For example, an initial voice weight value a is set2100%, if the voice information of the user is the same as the voice information of the registered user, the voice weight value a2Increased by 10%, i.e. the speech weight value a at that time2Is 110 percent
In step S510, the terminal 401 to be authenticated sends call record information (for example, K call records in the last 30 minutes, where K is an integer greater than or equal to 1) of the terminal 401 to be authenticated within a preset time duration to the account opening system server 403.
Step S511, the account opening system server 403 analyzes the received call record information of the terminal 401 to be authenticated within the preset duration and the pre-stored historical call record information of the terminal 401 to be authenticated, to obtain a call record characteristic value; and determining a call record weight value corresponding to the call record information according to the call record information of the user.
For example, a feature vector F corresponding to call log information is set3The weight value of the call record is a3. By comparing the call log information of the user with the history call log information, a call log comparison result can be obtained, and the call log characteristic value F (F) can be determined based on the call log comparison result3) The call log feature value F (F)3) The value range of (a) is greater than or equal to-1 and less than or equal to 1. Wherein f represents the mapping relation between the call record characteristic value and the preset call record threshold value, i.e. mapping the call record characteristic value to the preset value range [ -1, 1 [ -1 [ ]]And (4) the following steps.
Note that the call record weight value a3Can be changed along with the change of the call record information of the user. For example, when the call log information of the user is much overlapped with the history call log, the call log weight value a3Will increase with it. For example, set initial call record weight value a3Is 100%, if the call log information of the user completely coincides with the history call log, the call log weight value a3Increase by 10%, i.e. the call record weight value a at this time3The content was 110%.
In step S512, the terminal 401 to be authenticated sends the short message record information (for example, the short message related to the personal information of the user of the authentication terminal 401 sent by any one or more of the bank, the functional institution or the operator received within the last 30 minutes) of the terminal 401 to be authenticated to the account opening system server 403 within the preset duration.
Step S513, the account opening system server 403 analyzes the received short message record information of the terminal 401 to be authenticated within the preset duration and the pre-stored historical short message record information of the terminal 401 to be authenticated, to obtain a short message record characteristic value; and determining the weight value of the short message record corresponding to the short message record information according to the short message record information of the user.
For example, a feature vector F corresponding to the short message record information is set4The weight value of the short message record is a4. By comparing the user's short message record information with the historical short message record information, the short message record comparison result can be obtained, and the short message record characteristic value F (F) can be determined according to the short message record comparison result4) The short message records the characteristic value F (F)4) The value range of (a) is greater than or equal to-1 and less than or equal to 1. Wherein f represents the mapping relation between the short message recording characteristic value and the preset short message recording threshold value, i.e. the short message recording characteristic value is mapped to the preset value range [ -1, 1 [ -1 [ ]]And (4) the following steps.
It should be noted that, the weight value a is recorded in the sms4Can be changed along with the change of the short message recording information of the user. For example, when the short message record information of the user is much overlapped with the historical short message record, the weight value a of the short message record is4Will increase with it. For example, set initial SMS record weight value a4100%, if the user's short message record information completely coincides with the historical short message record information, the weight value a of the short message record is determined4Adding 10% of the weight value a of the short message record at the moment4The content was 110%.
In step S514, the terminal 401 to be authenticated sends the current location information of the terminal 401 to be authenticated to the account opening system server 403.
Step S515, the account opening system server 403 analyzes the received current location information of the terminal 401 to be authenticated and the pre-stored geographic location information (for example, the registered 5G/4G cell information (including cell PCI and other information)) of the terminal 401 to be authenticated within a preset time period (for example, the latest 10 minutes), and obtains a location feature value; according to the current position information of the terminal 401 to be authenticated, a position weight value corresponding to the position information is determined.
For example, a feature vector F corresponding to the position information is set5Position weighted value of a5. By comparing the user's location information with the pre-stored geographical location information of the terminal 401 to be authenticated within a preset time period, a location comparison result can be obtained, and a location feature value F (F) can be determined according to the location comparison result5) The position feature value F (F)5) The value range of (a) is greater than or equal to-1 and less than or equal to 1. Wherein f represents the mapping relation between the position characteristic value and the preset position threshold, i.e. the position characteristic value is mapped to the preset value range [ -1, 1 [ -1 [ ]]And (4) the following steps.
In some specific implementations, the terminal 401 to be authenticated may further upload a self-portrait photo to the account opening system server 403, where the self-portrait photo carries location information, and the account opening system server 403 determines a location comparison result by comparing the self-portrait photo with the identity information of the registered user of the terminal 401 to be authenticated.
The position weight value a5May be changed with the change of the pre-stored geographical location information of the terminal 401 to be authenticated within the preset time period. For example, when the current location information of the terminal 401 to be authenticated is much overlapped with the pre-stored geographic location information of the terminal 401 to be authenticated within the preset time period, the location weight value a5Will increase with it. For example, an initial position weight value a is set5To be 100%, if the current location information of the terminal 401 to be authenticated is completely duplicated with the pre-stored geographic location information of the terminal 401 to be authenticated within the preset time periodIf yes, then position weighted value a5Increased by 10%, i.e. the position weight value a at that time5The content was 110%.
In step S516, the account opening system server 403 determines whether the user of the terminal 401 to be authenticated passes authentication according to at least 2 of the video feature value and the video weight value, the voice recognition feature value and the voice weight value, the call record feature value and the call record weight value, the short message record feature value and the short message record weight value, and the location feature value and the location weight value in the above steps. If the authentication is successful, the required service is opened for the terminal 401 to be authenticated; otherwise, manual review is performed to determine the authentication result of the terminal 401 to be authenticated.
Specifically, the following formula (1) may be adopted to perform calculation, obtain the authentication value M of the terminal 401 to be authenticated, and then determine whether the user of the terminal 401 to be authenticated passes authentication according to the authentication weight M and a preset authentication threshold (for example, 100%).
M=a1f(F1)+a2f(F2)+…+a5f(F5) (1)
Wherein, a1Represents the video weight value, a2The voice weight value is represented, the call record weight value is represented, the short message record weight value is represented, and the position weight value is represented; representing a feature vector corresponding to the video information, F2Feature vectors representing the correspondence of speech information, F3Feature vectors representing correspondence of call records, F4Feature vector representing correspondence of short message record information, F5Representing a feature vector corresponding to the position information; f represents the mapping relation between each characteristic value and the corresponding preset threshold value; m denotes an authentication value of the terminal 401 to be authenticated.
For example, when M is greater than a preset authentication threshold, it may be determined that the terminal 401 to be authenticated passes authentication; otherwise, it is determined that the terminal 401 to be authenticated does not pass the authentication.
In the embodiment, the authentication terminal is authenticated through various different information, the authentication terminal and the user thereof are authenticated through various different dimensions, the accuracy of the authentication result is determined, the authentication success rate of the authentication terminal is improved, the online service is opened for the authentication terminal under the condition that the authentication terminal passes the authentication, the user can complete the opening of the online service safely by self, and the user experience is improved. .
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.

Claims (10)

1. A method for provisioning services, the method comprising:
acquiring information to be verified of a terminal to be authenticated, wherein the information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information;
determining a weight value corresponding to the information to be verified according to the information to be verified;
determining an authentication value according to the information to be verified and the weight value corresponding to the information to be verified;
judging whether the terminal to be authenticated passes authentication or not according to the authentication value and a preset authentication threshold value;
and opening an on-line service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication.
2. The method according to claim 1, wherein after determining the weight value corresponding to the information to be verified according to the information to be verified, and before determining the authentication value according to the information to be verified and the weight value corresponding thereto, the method further comprises:
determining at least two of a video characteristic value, a voice recognition characteristic value, a call record characteristic value, a short message record characteristic value and a position characteristic value by adopting the following modes:
determining the video characteristic value according to the video information;
determining the voice recognition characteristic value according to the voice recognition information;
determining the call record characteristic value according to the call record information;
determining the short message recording characteristic value according to the short message recording information;
and determining the position characteristic value according to the position information.
3. The method according to claim 2, wherein the video information includes identity information of a user corresponding to the terminal to be authenticated and identity information of a registered user of the terminal to be authenticated;
the determining the video feature value according to the video information includes:
and determining the video characteristic value according to the identity information of the registered user and the identity information of the user.
4. The method according to claim 2, wherein the voice recognition information includes voice information of a user corresponding to the terminal to be authenticated and voice information of a registered user of the terminal to be authenticated;
the determining the speech recognition feature value according to the speech recognition information includes:
comparing the voice information of the user with the voice information of the registered user, and determining a voice comparison result;
and determining the voice recognition characteristic value according to the voice comparison result.
5. The method according to claim 2, wherein the location information characterizes information of a geographical location where the terminal to be authenticated is located;
the determining the position characteristic value according to the position information includes:
acquiring registered cell information of the terminal to be authenticated, wherein the registered cell information comprises an identifier of a registered cell and position information corresponding to the registered cell;
and determining the position characteristic value according to the information of the geographical position of the terminal to be authenticated and the position information corresponding to the registration cell.
6. The method according to claim 2, wherein the call record information comprises a call record to be verified of the terminal to be authenticated within a preset time and a history call record of the terminal to be authenticated;
the determining the call record characteristic value according to the call record information includes:
and comparing the call record to be verified with the historical call record, and determining the characteristic value of the call record.
7. The method of claim 2, wherein the video eigenvalue, the voice recognition eigenvalue, the call record eigenvalue, the short message record eigenvalue, and the position eigenvalue are real numbers within a preset value range.
8. The method according to claim 2, wherein the determining an authentication value according to the information to be verified and the weight value corresponding to the information to be verified comprises:
and determining the authentication value according to at least two of the video characteristic value and the corresponding weight value thereof, the voice recognition characteristic value and the corresponding weight value thereof, the call record characteristic value and the corresponding weight value thereof, the short message record characteristic value and the corresponding weight value thereof, and the position characteristic value and the corresponding weight value thereof.
9. A server, characterized in that it comprises:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring information to be verified of a terminal to be authenticated, and the information to be verified comprises at least two of video information, voice recognition information, call recording information, short message recording information and position information;
the weight value determining module is used for determining a weight value corresponding to the information to be verified according to the information to be verified;
the authentication value determining module is used for determining an authentication value according to the information to be verified and the weight value corresponding to the information to be verified;
the judging module is used for judging whether the terminal to be authenticated passes the authentication or not according to the authentication value and a preset authentication threshold value;
and the service opening module is used for opening a preset service for the terminal to be authenticated under the condition that the terminal to be authenticated is determined to pass the authentication.
10. The server according to claim 9, further comprising:
the characteristic value determining module is used for determining at least two of a video characteristic value, a voice recognition characteristic value, a call record characteristic value, a short message record characteristic value and a position characteristic value;
the video feature value is a feature value determined according to the video information, the voice recognition feature value is a feature value determined according to the voice recognition information, the call record feature value is a feature value determined according to the call record information, the short message record feature value is a feature value determined according to the short message record information, and the position feature value is a feature value determined according to the position information.
CN202110320079.6A 2021-03-25 2021-03-25 Service provisioning method and server Pending CN113068155A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110320079.6A CN113068155A (en) 2021-03-25 2021-03-25 Service provisioning method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110320079.6A CN113068155A (en) 2021-03-25 2021-03-25 Service provisioning method and server

Publications (1)

Publication Number Publication Date
CN113068155A true CN113068155A (en) 2021-07-02

Family

ID=76561928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110320079.6A Pending CN113068155A (en) 2021-03-25 2021-03-25 Service provisioning method and server

Country Status (1)

Country Link
CN (1) CN113068155A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113486311A (en) * 2021-07-22 2021-10-08 中国联合网络通信集团有限公司 Access authorization method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110286584A1 (en) * 2010-05-18 2011-11-24 Albert Angel Certified Communications System and Method
CN108200532A (en) * 2016-12-08 2018-06-22 中国移动通信集团四川有限公司 It is a kind of to verify the method and system made up SIM card user identity and be associated with SIM card
CN110225002A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 Business handling method and Related product
CN110717164A (en) * 2019-12-16 2020-01-21 国网电子商务有限公司 Intelligent multidimensional weighting identity authentication and risk control method and system
CN111586019A (en) * 2020-04-30 2020-08-25 中国银行股份有限公司 Identity authentication method and device and service equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110286584A1 (en) * 2010-05-18 2011-11-24 Albert Angel Certified Communications System and Method
CN108200532A (en) * 2016-12-08 2018-06-22 中国移动通信集团四川有限公司 It is a kind of to verify the method and system made up SIM card user identity and be associated with SIM card
CN110225002A (en) * 2019-05-21 2019-09-10 平安科技(深圳)有限公司 Business handling method and Related product
CN110717164A (en) * 2019-12-16 2020-01-21 国网电子商务有限公司 Intelligent multidimensional weighting identity authentication and risk control method and system
CN111586019A (en) * 2020-04-30 2020-08-25 中国银行股份有限公司 Identity authentication method and device and service equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
SIEMENS AG: "S3-000561: Proposed changes and discussion of open issues for draft 3G TR Access security for IP-based services", 《3GPP TSG_SA\WG3_SECURITY》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113486311A (en) * 2021-07-22 2021-10-08 中国联合网络通信集团有限公司 Access authorization method and device
CN113486311B (en) * 2021-07-22 2023-06-02 中国联合网络通信集团有限公司 Access authorization method and device

Similar Documents

Publication Publication Date Title
CN109429230B (en) Communication fraud identification method and system
US10757102B2 (en) Methods, apparatus, and systems for identity authentication
US9002814B2 (en) Location based authorization of financial card transactions systems and methods
US8510319B2 (en) Location based information for emergency services systems and methods
CN110298421B (en) Online generation, offline generation and verification method and device for two-dimensional code
US9338286B2 (en) Methods and systems for real time display of caller location, profile, and trust relationship
CN106878309B (en) Safety early warning method and device applied to network payment
CN105871786B (en) A kind of verification method of user information, device and system
KR101970123B1 (en) Dual channel identity authentication
WO2013113025A2 (en) Authenticating entities engaging in automated or electronic transactions or activities
CN107451488B (en) Method and device for providing personal information and mobile terminal
CA2831527A1 (en) Computer-implemented system and method for validating call connections
CN111797418A (en) Control method and device of online service, service terminal, server and storage medium
KR101306074B1 (en) Method and system to prevent phishing
CN113068178A (en) Terminal authentication method and server
CN110730446A (en) Login method, terminal and computer storage medium
CN113068155A (en) Service provisioning method and server
CN109640277B (en) Short message processing method and device applied to USIM card
CN108235310A (en) Method, server and the system of identification camouflage telephone number
CN106101193B (en) Information backup method, terminal equipment, operator server and backup system
CN106713580B (en) A kind of telephone number recognition methods, security server and terminal
CN110830930B (en) Verification code anti-sniffing processing method and device
KR100610352B1 (en) The method for protecting private information from lost or stolen portable phone and computer readable recording medium thereof
CN113271590B (en) Secure access system for wireless office networks
CN112950199B (en) Anti-theft method and server for communication identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210702