CN113487317A - Identity authentication method, device and system - Google Patents

Identity authentication method, device and system Download PDF

Info

Publication number
CN113487317A
CN113487317A CN202110850222.2A CN202110850222A CN113487317A CN 113487317 A CN113487317 A CN 113487317A CN 202110850222 A CN202110850222 A CN 202110850222A CN 113487317 A CN113487317 A CN 113487317A
Authority
CN
China
Prior art keywords
user
identity authentication
mobile terminal
authentication information
party system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110850222.2A
Other languages
Chinese (zh)
Inventor
黄文强
黄雅楠
徐晨敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202110850222.2A priority Critical patent/CN113487317A/en
Publication of CN113487317A publication Critical patent/CN113487317A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an identity authentication method, an identity authentication device and an identity authentication system, wherein under the condition that a first user is inconvenient to perform identity authentication by inputting a password and/or a signature and the first user authorizes a second user to perform a proxy identity authentication function in a third-party system in advance, the first user sends a proxy authentication request to a second mobile terminal bound by the second user by using a first mobile terminal bound by the first user, the second user inputs identity authentication information through the second mobile terminal and then sends the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system, and under the condition of ensuring the safety of an account of the first user, the second user replaces the first user to complete identity authentication, and the user experience is improved.

Description

Identity authentication method, device and system
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, and a system for identity authentication.
Background
In the situations of bank withdrawal, card swiping payment and the like, generally, a user is required to input a password and a signature for identity verification.
However, for the elderly users, users who cannot write, users who are inconvenient to write, and users with poor memory, it is difficult to perform authentication by inputting passwords and signatures, so that payment transaction or business transaction cannot be completed normally.
Disclosure of Invention
In view of this, the present invention provides an identity authentication method, apparatus and system, where a first user is inconvenient to perform identity authentication by inputting a password and/or a signature, the first user sends a substitute authentication request to a second mobile terminal bound by a second user by using a first mobile terminal bound by the first user, so that the second user completes identity authentication by using the second mobile terminal instead of the first user, and user experience is improved.
In order to achieve the above purpose, the invention provides the following specific technical scheme:
an identity authentication method is applied to a first mobile terminal in an identity authentication system, the identity authentication system further comprises a second mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information on the third-party system in advance, and the method comprises the following steps:
responding to an identity authentication instruction, and sending a generation authentication request to the second mobile terminal;
receiving a video verification request sent by the second mobile terminal, starting a camera of the first mobile terminal, and connecting a video call with the second mobile terminal;
receiving identity authentication information sent by a second mobile terminal under the condition that the second user completes video verification on the first user through the second mobile terminal;
and sending the identity authentication information to the third-party system to complete identity authentication.
Optionally, the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user inputs the signature information of the second user in the third-party system in advance.
An identity authentication method is applied to a second mobile terminal in an identity authentication system, the identity authentication system further comprises a first mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information on the third-party system in advance, and the method comprises the following steps:
under the condition of receiving a proxy authentication request sent by the first mobile terminal, starting a camera of the second mobile terminal, and sending a video verification request to the first mobile terminal;
after the video call with the first mobile terminal is connected and a video verification passing instruction triggered by the second user is received, receiving identity authentication information input by the second user;
and sending the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system to complete identity authentication.
Optionally, after receiving the proxy authentication request sent by the first mobile terminal, the method further includes:
prompting the second user to input a login password;
judging whether the login password input by the second user is consistent with the login password input by the second user in advance;
and under the condition that the login password input by the second user is consistent with the login password pre-input by the second user, triggering and executing the camera for starting the second mobile terminal.
An identity authentication device is applied to a first mobile terminal in an identity authentication system, the identity authentication system further comprises a second mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information in the third-party system in advance, the identity authentication device comprises:
a generation authentication request sending unit, configured to send a generation authentication request to the second mobile terminal in response to the identity authentication instruction;
the video call connection unit is used for receiving a video verification request sent by the second mobile terminal, starting a camera of the first mobile terminal and connecting a video call with the second mobile terminal;
the identity authentication information receiving unit is used for receiving identity authentication information sent by the second mobile terminal under the condition that the second user completes video verification on the first user through the second mobile terminal;
and the identity authentication unit is used for sending the identity authentication information to the third-party system to complete identity authentication.
Optionally, the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user inputs the signature information of the second user in the third-party system in advance.
An identity authentication device is applied to a second mobile terminal in an identity authentication system, the identity authentication system further comprises a first mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information in the third-party system in advance, the identity authentication device comprises:
the video call initiating unit is used for starting a camera of the second mobile terminal and sending a video verification request to the first mobile terminal under the condition of receiving a proxy authentication request sent by the first mobile terminal;
the identity authentication information acquisition unit is used for receiving identity authentication information input by the second user after the video call with the first mobile terminal is connected and the video verification passing instruction triggered by the second user is received;
and the identity authentication information sending unit is used for sending the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system to complete identity authentication.
Optionally, the apparatus further comprises:
the login verification unit is used for prompting the second user to input a login password after receiving the proxy authentication request sent by the first mobile terminal; judging whether the login password input by the second user is consistent with the login password input by the second user in advance; and under the condition that the login password input by the second user is consistent with the login password pre-input by the second user, triggering the video call initiating unit.
An identity authentication system comprising: the system comprises a first mobile terminal, a second mobile terminal and a third-party system;
a first user is bound with the first mobile terminal, and a second user is bound with the second mobile terminal;
the first user authorizes the second user to perform identity authentication on the third-party system in advance;
the second user inputs identity authentication information in the third-party system in advance;
the first mobile terminal is configured to execute an identity authentication method disclosed in the above embodiment;
the second mobile terminal is configured to execute an identity authentication method disclosed in the foregoing embodiment;
the third-party system is used for judging whether the identity authentication information is consistent with the identity authentication information reserved by the first user or not after receiving the identity authentication information sent by the first mobile terminal, sending identity authentication passing information to the first mobile terminal under the condition that the identity authentication information is consistent with the identity authentication information reserved by the first user, and sending identity authentication failing information to the first mobile terminal under the condition that the identity authentication information is inconsistent with the identity authentication information reserved by the first user.
Compared with the prior art, the invention has the following beneficial effects:
the invention discloses an identity authentication method, which is characterized in that under the condition that a first user is inconvenient to perform identity authentication in a mode of inputting a password and/or a signature and the first user authorizes a second user to perform a proxy identity authentication function in a third-party system in advance, the first user sends a proxy authentication request to a second mobile terminal bound by the second user by using a first mobile terminal bound by the first user, the second user inputs identity authentication information through the second mobile terminal and then sends the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system, and the second user replaces the first user to complete identity authentication under the condition of ensuring the safety of the account of the first user, thereby improving the user experience.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of an identity authentication method applied to a first mobile terminal according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating an identity authentication method applied to a second mobile terminal according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an identity authentication apparatus applied to a first mobile terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an identity authentication apparatus applied to a second mobile terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an identity authentication system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention discloses an identity authentication method, which is applied to a first mobile terminal in an identity authentication system, the identity authentication system also comprises a second mobile terminal and a third party system, the third party system can be a bank system, a payment system and the like, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user can be an old user or a user who can not write, the second user can be a user who is trusted by the first user and is convenient to perform identity authentication by signing and/or inputting a password, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information, such as signature information, on the third-party system in advance. The first user sends a proxy authentication request to a second mobile terminal bound by a second user by using a first mobile terminal bound by the first user, the second user inputs identity authentication information through the second mobile terminal and then sends the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to a third-party system, the second user replaces the first user to complete identity authentication under the condition of ensuring the safety of the account of the first user, and the user experience is improved.
Specifically, referring to fig. 1, the identity authentication method applied to the first mobile terminal disclosed in this embodiment specifically includes the following steps:
s101: responding to the identity authentication instruction, and sending a generation authentication request to the second mobile terminal;
after the first mobile terminal is accessed into the third-party system, the third-party system may trigger the identity authentication and send an identity authentication instruction to the first mobile terminal, or the first user may trigger the identity authentication instruction by triggering a specific button in the first mobile terminal.
S102: receiving a video verification request sent by a second mobile terminal, starting a camera of a first mobile terminal, and connecting a video call with the second mobile terminal;
after the second mobile terminal receives the agent authentication request sent by the first mobile terminal, the second user needs to verify the identity of the first user, so that a person is prevented from impersonating the first mobile terminal.
Specifically, video verification is performed in a mode of video call between the first mobile terminal and the second mobile terminal.
S103: under the condition that a second user completes video verification on a first user through a second mobile terminal, receiving identity authentication information sent by the second mobile terminal;
the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user inputs the signature information of the second user in a third-party system in advance.
It is understood that the password is set by the first user, and the second user knows the password set by the first user in advance, where the password in the authentication information is the password of the first user input by the second user.
S104: and sending the identity authentication information to a third-party system to complete identity authentication.
The first mobile terminal sends the identity authentication information to a third-party system, judges whether the identity authentication information is consistent with the identity authentication information reserved by the first user, sends identity authentication passing information to the first mobile terminal under the condition that the identity authentication information is consistent with the identity authentication information reserved by the first user, and sends identity authentication failing information to the first mobile terminal under the condition that the identity authentication information is inconsistent with the identity authentication information reserved by the first user.
Based on the identity authentication method applied to the first mobile terminal disclosed in the above embodiment, the embodiment correspondingly discloses an identity authentication method applied to the second mobile terminal, please refer to fig. 2, and the method specifically includes the following steps:
s201: under the condition of receiving a proxy authentication request sent by a first mobile terminal, starting a camera of a second mobile terminal, and sending a video verification request to the first mobile terminal;
s202: after the video call with the first mobile terminal is connected and a video verification passing instruction triggered by the second user is received, receiving identity authentication information input by the second user;
and when the identity authentication information comprises signature information, the second mobile terminal receives the signature information handwritten on the screen of the second mobile terminal by the second user or written by a touch pen.
And when the identity authentication information comprises the password, the second mobile terminal receives the password of the first user input by the second user.
S203: and sending the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system to complete identity authentication.
Further, in order to verify the identity of the second user, after receiving the proxy authentication request sent by the first mobile terminal, the second mobile terminal prompts the second user to input a login password, judges whether the login password input by the second user is consistent with the login password pre-input by the second user, and triggers and starts a camera of the second mobile terminal under the condition that the login password input by the second user is consistent with the login password pre-input by the second user.
Based on the identity authentication method applied to the first mobile terminal disclosed in the foregoing embodiment, this embodiment correspondingly discloses an identity authentication device applied to the first mobile terminal, please refer to fig. 3, and the device includes:
a proxy authentication request sending unit 301, configured to send a proxy authentication request to the second mobile terminal in response to the identity authentication instruction;
a video call connection unit 302, configured to receive a video verification request sent by the second mobile terminal, start a camera of the first mobile terminal, and connect a video call with the second mobile terminal;
an identity authentication information receiving unit 303, configured to receive identity authentication information sent by the second mobile terminal when the second user completes video verification on the first user through the second mobile terminal;
and an identity authentication unit 304, configured to send the identity authentication information to the third-party system, so as to complete identity authentication.
Optionally, the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user inputs the signature information of the second user in the third-party system in advance.
Based on the identity authentication method applied to the second mobile terminal disclosed in the foregoing embodiment, this embodiment correspondingly discloses an identity authentication device applied to the second mobile terminal, please refer to fig. 4, and the device includes:
a video call initiating unit 401, configured to start a camera of the second mobile terminal and send a video verification request to the first mobile terminal when receiving a proxy authentication request sent by the first mobile terminal;
an identity authentication information obtaining unit 402, configured to receive identity authentication information input by the second user after the video call with the first mobile terminal is connected and a video verification passing instruction triggered by the second user is received;
an identity authentication information sending unit 403, configured to send the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system, thereby completing identity authentication.
Optionally, the apparatus further comprises:
the login verification unit is used for prompting the second user to input a login password after receiving the proxy authentication request sent by the first mobile terminal; judging whether the login password input by the second user is consistent with the login password input by the second user in advance; and under the condition that the login password input by the second user is consistent with the login password pre-input by the second user, triggering the video call initiating unit.
The present embodiment also discloses an identity authentication system, please refer to fig. 5, which includes: a first mobile terminal 501, a second mobile terminal 502 and a third party system 503;
a first user is bound with the first mobile terminal 501, and a second user is bound with the second mobile terminal 502;
the first user pre-authorizes the second user to perform identity authentication on the third party system 503;
the second user inputs the identity authentication information in the third-party system 503 in advance;
the first mobile terminal 501 is configured to execute the following identity authentication method:
responding to an identity authentication instruction, and sending a generation authentication request to the second mobile terminal;
receiving a video verification request sent by the second mobile terminal, starting a camera of the first mobile terminal, and connecting a video call with the second mobile terminal;
receiving identity authentication information sent by a second mobile terminal under the condition that the second user completes video verification on the first user through the second mobile terminal;
and sending the identity authentication information to the third-party system to complete identity authentication.
Further, the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user inputs the signature information of the second user in the third-party system in advance.
The second mobile terminal 502 is configured to execute the following identity authentication method:
under the condition of receiving a proxy authentication request sent by the first mobile terminal, starting a camera of the second mobile terminal, and sending a video verification request to the first mobile terminal;
after the video call with the first mobile terminal is connected and a video verification passing instruction triggered by the second user is received, receiving identity authentication information input by the second user;
and sending the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system to complete identity authentication.
Further, after receiving the proxy authentication request sent by the first mobile terminal, the method further includes:
prompting the second user to input a login password;
judging whether the login password input by the second user is consistent with the login password input by the second user in advance;
and under the condition that the login password input by the second user is consistent with the login password pre-input by the second user, triggering and executing the camera for starting the second mobile terminal.
The third-party system is used for judging whether the identity authentication information is consistent with the identity authentication information reserved by the first user or not after receiving the identity authentication information sent by the first mobile terminal, sending identity authentication passing information to the first mobile terminal under the condition that the identity authentication information is consistent with the identity authentication information reserved by the first user, and sending identity authentication failing information to the first mobile terminal under the condition that the identity authentication information is inconsistent with the identity authentication information reserved by the first user.
The identity authentication system disclosed in this embodiment is described in detail below by a scenario embodiment, in which the first mobile terminal and the second mobile terminal are specifically smart watches, the first user is an old person, the second user is a sign-on-behalf person, and the third-party system is a bank counter system.
If the old man wants to open to take the place of the identity authentication function, need old man and sign personnel of taking the place of and in bank counter system authentication identity, old man and sign personnel of taking the place of can respectively draw an intelligent wrist-watch after signing relevant agreement, sign personnel of taking the place of set up intelligent wrist-watch login password, type signature simultaneously, bank counter system compares after the convenience. The old people set up the passbook withdrawal password, sign personnel can know the withdrawal password but can not withdraw money instead of the passbook, and the old people must be present and can withdraw money.
When the old man goes to bank website and withdraws money with the bankbook or handle the business and can not sign, can launch input password or launch the signature function on intelligent wrist-watch screen, the wrist-watch passes through built-in SIM card chip networking, sends the task to rather than the intelligent wrist-watch of mating, sign personnel's intelligent wrist-watch promptly on behalf of. After receiving the task request, the signing-on-behalf personnel needs to log in a signing-on-behalf system of the smart watch through a login password, after the identity is verified, the signing-on-behalf personnel can select to verify whether the person who initiates the task is the owner, after the identity of the old is verified through the function of initiating video chat, the signing-on-behalf personnel can input a withdrawal password or a signature, and after clicking is completed, the smart watch packages password information or signature information input by the signing-on-behalf personnel and sends the password information or the signature information to the smart watch of the old. The intelligent wrist-watch of old man connects bank counter system, sends the authentication information of packing to bank counter system, and bank counter system verifies whether the password is correct, compares and whether the signature information who replaces the signature compares with the signature information that the customer reserved is unanimous, if unanimous then can help the old man to handle relevant business.
It can be seen that, in the identity authentication system disclosed in this embodiment, when a first user is inconvenient to perform identity authentication by inputting a password and/or a signature and the first user authorizes a second user to perform a proxy identity authentication function in a third-party system in advance, the first user sends a proxy authentication request to a second mobile terminal bound by the second user by using a first mobile terminal bound by the first user, the second user inputs identity authentication information through the second mobile terminal and then sends the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system, and the second user replaces the first user to complete identity authentication under the condition that the account security of the first user is ensured, thereby improving user experience.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above embodiments can be combined arbitrarily, and the features described in the embodiments in the present specification can be replaced or combined with each other in the above description of the disclosed embodiments, so that those skilled in the art can implement or use the present application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. An identity authentication method is applied to a first mobile terminal in an identity authentication system, the identity authentication system further comprises a second mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information on the third-party system in advance, and the method comprises the following steps:
responding to an identity authentication instruction, and sending a generation authentication request to the second mobile terminal;
receiving a video verification request sent by the second mobile terminal, starting a camera of the first mobile terminal, and connecting a video call with the second mobile terminal;
receiving identity authentication information sent by a second mobile terminal under the condition that the second user completes video verification on the first user through the second mobile terminal;
and sending the identity authentication information to the third-party system to complete identity authentication.
2. The method according to claim 1, wherein the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user enters signature information of the second user in the third-party system in advance.
3. An identity authentication method is applied to a second mobile terminal in an identity authentication system, the identity authentication system further comprises a first mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information on the third-party system in advance, and the method comprises the following steps:
under the condition of receiving a proxy authentication request sent by the first mobile terminal, starting a camera of the second mobile terminal, and sending a video verification request to the first mobile terminal;
after the video call with the first mobile terminal is connected and a video verification passing instruction triggered by the second user is received, receiving identity authentication information input by the second user;
and sending the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system to complete identity authentication.
4. The method according to claim 3, wherein after receiving the proxy authentication request sent by the first mobile terminal, the method further comprises:
prompting the second user to input a login password;
judging whether the login password input by the second user is consistent with the login password input by the second user in advance;
and under the condition that the login password input by the second user is consistent with the login password pre-input by the second user, triggering and executing the camera for starting the second mobile terminal.
5. An identity authentication device is applied to a first mobile terminal in an identity authentication system, the identity authentication system further comprises a second mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information on the third-party system in advance, the identity authentication device comprises:
a generation authentication request sending unit, configured to send a generation authentication request to the second mobile terminal in response to the identity authentication instruction;
the video call connection unit is used for receiving a video verification request sent by the second mobile terminal, starting a camera of the first mobile terminal and connecting a video call with the second mobile terminal;
the identity authentication information receiving unit is used for receiving identity authentication information sent by the second mobile terminal under the condition that the second user completes video verification on the first user through the second mobile terminal;
and the identity authentication unit is used for sending the identity authentication information to the third-party system to complete identity authentication.
6. The apparatus according to claim 5, wherein the identity authentication information is signature information of the second user and/or a password of the first user input by the second user, and the second user enters his signature information in the third-party system in advance.
7. An identity authentication device is applied to a second mobile terminal in an identity authentication system, the identity authentication system further comprises a first mobile terminal and a third-party system, a first user is bound with the first mobile terminal, a second user is bound with the second mobile terminal, the first user authorizes the second user to perform identity authentication on the third-party system in advance, and the second user inputs identity authentication information on the third-party system in advance, the identity authentication device comprises:
the video call initiating unit is used for starting a camera of the second mobile terminal and sending a video verification request to the first mobile terminal under the condition of receiving a proxy authentication request sent by the first mobile terminal;
the identity authentication information acquisition unit is used for receiving identity authentication information input by the second user after the video call with the first mobile terminal is connected and the video verification passing instruction triggered by the second user is received;
and the identity authentication information sending unit is used for sending the identity authentication information to the first mobile terminal, so that the first mobile terminal sends the identity authentication information to the third-party system to complete identity authentication.
8. The apparatus of claim 7, further comprising:
the login verification unit is used for prompting the second user to input a login password after receiving the proxy authentication request sent by the first mobile terminal; judging whether the login password input by the second user is consistent with the login password input by the second user in advance; and under the condition that the login password input by the second user is consistent with the login password pre-input by the second user, triggering the video call initiating unit.
9. An identity authentication system, comprising: the system comprises a first mobile terminal, a second mobile terminal and a third-party system;
a first user is bound with the first mobile terminal, and a second user is bound with the second mobile terminal;
the first user authorizes the second user to perform identity authentication on the third-party system in advance;
the second user inputs identity authentication information in the third-party system in advance;
the first mobile terminal, configured to perform an identity authentication method according to claim 1 or 2;
the second mobile terminal, configured to perform an identity authentication method according to claim 3 or 4;
the third-party system is used for judging whether the identity authentication information is consistent with the identity authentication information reserved by the first user or not after receiving the identity authentication information sent by the first mobile terminal, sending identity authentication passing information to the first mobile terminal under the condition that the identity authentication information is consistent with the identity authentication information reserved by the first user, and sending identity authentication failing information to the first mobile terminal under the condition that the identity authentication information is inconsistent with the identity authentication information reserved by the first user.
CN202110850222.2A 2021-07-27 2021-07-27 Identity authentication method, device and system Pending CN113487317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110850222.2A CN113487317A (en) 2021-07-27 2021-07-27 Identity authentication method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110850222.2A CN113487317A (en) 2021-07-27 2021-07-27 Identity authentication method, device and system

Publications (1)

Publication Number Publication Date
CN113487317A true CN113487317A (en) 2021-10-08

Family

ID=77943951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110850222.2A Pending CN113487317A (en) 2021-07-27 2021-07-27 Identity authentication method, device and system

Country Status (1)

Country Link
CN (1) CN113487317A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198504A (en) * 2009-02-26 2010-09-09 Baybig Co Ltd Safety confirmation device, control method therefor, and program
CN104584607A (en) * 2012-08-30 2015-04-29 微软公司 Mobile device child share
CN104901936A (en) * 2014-10-17 2015-09-09 腾讯科技(深圳)有限公司 Business processing method and device, terminal and server
CN106204035A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Off-line identity identifying method, intelligent terminal and system
CN107079034A (en) * 2016-11-15 2017-08-18 深圳达闼科技控股有限公司 A kind of identity authentication method, terminal device, certificate server and electronic equipment
US20200396221A1 (en) * 2018-12-04 2020-12-17 Journey.ai Providing access control and persona validation for interactions

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010198504A (en) * 2009-02-26 2010-09-09 Baybig Co Ltd Safety confirmation device, control method therefor, and program
CN104584607A (en) * 2012-08-30 2015-04-29 微软公司 Mobile device child share
CN104901936A (en) * 2014-10-17 2015-09-09 腾讯科技(深圳)有限公司 Business processing method and device, terminal and server
CN106204035A (en) * 2015-04-30 2016-12-07 阿里巴巴集团控股有限公司 Off-line identity identifying method, intelligent terminal and system
CN107079034A (en) * 2016-11-15 2017-08-18 深圳达闼科技控股有限公司 A kind of identity authentication method, terminal device, certificate server and electronic equipment
US20200396221A1 (en) * 2018-12-04 2020-12-17 Journey.ai Providing access control and persona validation for interactions

Similar Documents

Publication Publication Date Title
AU2020200734B2 (en) Systems and methods for monitoring computer authentication procedures
US20220398594A1 (en) Pro-active identity verification for authentication of transaction initiated via non-voice channel
WO2018014789A1 (en) Method and device for controlling service operation risk
US8887232B2 (en) Central biometric verification service
TWI530894B (en) Method and related apparatus for information verification and apparatus thereof
EP3138265B1 (en) Enhanced security for registration of authentication devices
CN108566391B (en) Login method and device for Internet of things equipment
CN105323253B (en) Identity verification method and device
US20150261948A1 (en) Two-factor authentication methods and systems
US20210157892A1 (en) Systems and methods for cross coupling risk analytics and one-time-passcodes
RU2724351C2 (en) Universal access to electronic wallet
US11276069B2 (en) Risk payment processing method and apparatus, and device
WO2015187533A1 (en) Client, computing platform, and methods for conducting secure transactions
US20210125194A1 (en) Method and system for completing cross-channel transactions
CN110930150A (en) Voucher generation method, voucher signature device, voucher verification method, voucher generation device, voucher verification device, and storage medium
CN109829273B (en) Identity authentication method, device, system, equipment and readable storage medium
CN105719130B (en) Payment verification method, device and system
CN110602679A (en) Display and transmission method, identity authentication and data transmission device and terminal
CN113487317A (en) Identity authentication method, device and system
WO2022143056A1 (en) Identity card-based hardware wallet fingerprint authentication method and system, and hardware wallet
TWM560084U (en) Login verification device and login verification system
CN114938305A (en) Safety authentication method, system and storage medium of financial equipment
CN115459980A (en) Login verification method, system, equipment and computer storage medium
CN116957581A (en) Payment transaction method and device, computer readable storage medium and terminal
CN113489828A (en) Verification code locking method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination