CN113536266A - Identity authentication method and device, electronic equipment and storage medium - Google Patents

Identity authentication method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113536266A
CN113536266A CN202110713559.9A CN202110713559A CN113536266A CN 113536266 A CN113536266 A CN 113536266A CN 202110713559 A CN202110713559 A CN 202110713559A CN 113536266 A CN113536266 A CN 113536266A
Authority
CN
China
Prior art keywords
target
verification
verification service
service object
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110713559.9A
Other languages
Chinese (zh)
Other versions
CN113536266B (en
Inventor
马睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202110713559.9A priority Critical patent/CN113536266B/en
Publication of CN113536266A publication Critical patent/CN113536266A/en
Application granted granted Critical
Publication of CN113536266B publication Critical patent/CN113536266B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The disclosure relates to an identity authentication method, an identity authentication device, an electronic device and a storage medium, wherein the method comprises the following steps: when an identity authentication request of a target account is received, acquiring identity information to be authenticated of the target account; determining a target verification service object corresponding to the target account, and verifying whether the identity information to be verified is matched with the target identity information of the target account through the target verification service object; and when the verification result of the target verification service object is verification failure, updating the target verification service object, and verifying whether the identity information to be verified is matched with the target identity information through the updated target verification service object until the verification result of the updated target verification service object is verification success. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the efficiency of identity verification can be improved.

Description

Identity authentication method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of information technologies, and in particular, to an identity authentication method and apparatus, an electronic device, and a storage medium.
Background
With the continuous development of technology, terminal devices represented by mobile phones are widely used, and mobile phones become indispensable products in life and work of people. The user can meet various requirements of the user through various application programs installed on the mobile phone. For example, a user may communicate with other users via a cell phone, watch a video online, or purchase a financial product, etc.
Because the daily life or work of the user needs to be completed by terminal equipment such as a mobile phone to a great extent, in order to avoid the leakage of the security information on the mobile phone of the user, the user needs to verify the validity of the user identity when accessing the related security service through the mobile phone, and the invasion of an illegal user is avoided. However, in the related art, the user validity verification method is single, and once the user identity verification fails, a manual verification process is generally performed, so that the identity verification process is complicated and the efficiency is low.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides an authentication method, an authentication device, an electronic device, and a storage medium.
According to an aspect of the embodiments of the present disclosure, there is provided an identity authentication method, including:
when an identity authentication request of a target account is received, acquiring identity information to be authenticated of the target account;
determining a target verification service object corresponding to the target account, and verifying whether the identity information to be verified is matched with the target identity information of the target account through the target verification service object;
and when the verification result of the target verification service object is verification failure, updating the target verification service object, and verifying whether the identity information to be verified is matched with the target identity information through the updated target verification service object until the verification result of the updated target verification service object is verification success.
Optionally, the determining a target authentication service object corresponding to the target account, and verifying whether the identity information to be authenticated matches the target identity information of the target account through the target authentication service object includes:
determining a verification service queue corresponding to the target account according to the account information of the target account, wherein the verification service queue comprises a plurality of verification service objects, the verification service objects are sequenced from high to low in stability, and the stability of each verification service object is determined by the historical verification success rate of the verification service object;
determining the verification service object with the highest stability in the verification service queue as a target verification service object corresponding to a target account;
and verifying whether the identity information to be verified is matched with the target identity information of the target account or not through the target verification service object.
Optionally, the method further comprises:
when the verification result returned by the target verification service object is preset error code information, counting the times of returning the preset error code information by the target verification service object;
and when the times are greater than the preset times, removing the target verification service object from the verification service queue to obtain an updated verification service queue.
Optionally, the updating the target authentication service object, and verifying whether the identity information to be authenticated is matched with the target identity information through the updated target authentication service object until the verification result of the updated target authentication service object is successful includes:
determining the verification service object with the highest stability in the updated verification service queue as an updated target verification service object;
verifying whether the identity information to be verified is matched with the target identity information of the target account or not through the updated target verification service object;
and when the verification result of the updated target verification service object is verification failure, continuously updating the verification service queue and the target verification service object until the verification result of the updated target verification service object is verification success.
Optionally, the determining, according to the account information of the target account, a verification service queue corresponding to the target account includes:
if the pre-established verification service queue does not exist locally, determining a plurality of verification service objects corresponding to the account information of the target account according to the corresponding relation between the account information and the verification service objects;
and sequencing the verification service objects according to the stability of the verification service objects to obtain a verification service queue corresponding to the target account.
Optionally, the method further comprises:
before the target verification service object is updated, detecting the integrity of the identity information to be verified, wherein the integrity of the identity information to be verified comprises information integrity or information loss;
if the integrity of the identity information to be verified is complete, executing the step of updating the target verification service object;
and if the integrity of the identity information to be verified is information loss, generating prompt information for re-inputting the identity information.
According to a second aspect of the embodiments of the present disclosure, there is provided an authentication apparatus including:
the authentication method comprises the steps that an identity information acquisition module to be authenticated is configured to acquire identity information to be authenticated of a target account when an identity authentication request of the target account is received;
a target verification service object determination module configured to determine a target verification service object corresponding to the target account, and verify whether the identity information to be verified matches the target identity information of the target account through the target verification service object;
the target verification service object updating module is configured to update the target verification service object when the verification result of the target verification service object is verification failure;
and the identity information matching module is configured to verify whether the identity information to be verified is matched with the target identity information through the updated target verification service object until the verification result of the updated target verification service object is successful.
Optionally, the target verification service object determining module includes:
the verification service queue determining unit is configured to determine a verification service queue corresponding to the target account according to the account information of the target account, wherein the verification service queue comprises a plurality of verification service objects, the verification service objects are sorted according to a sequence from high stability to low stability, and the stability of each verification service object is determined by the historical verification success rate of the verification service object;
the target verification service object determining unit is configured to determine the verification service object with the highest stability in the verification service queue as a target verification service object corresponding to a target account;
and the identity information matching unit is configured to verify whether the identity information to be verified is matched with the target identity information of the target account through the target verification service object.
Optionally, the apparatus further comprises:
the frequency counting module is configured to count the frequency of returning the preset error code information by the target verification service object when the verification result returned by the target verification service object is the preset error code information;
and the verification service object removing module is configured to remove the target verification service object from the verification service queue to obtain an updated verification service queue when the number of times is greater than a preset number of times.
Optionally, the target verification service object update module includes:
a target verification service object updating unit configured to determine a verification service object with the highest stability in the updated verification service queue as an updated target verification service object;
the identity information matching module comprises:
the identity information matching unit is configured to verify whether the identity information to be verified is matched with the target identity information of the target account through the updated target verification service object;
and the updating unit is configured to continuously update the verification service queue and the target verification service object when the verification result of the updated target verification service object is verification failure until the verification result of the updated target verification service object is verification success.
Optionally, the verification service queue determining unit includes:
the verification service object determining subunit is configured to determine, when a pre-established verification service queue does not exist locally, a plurality of verification service objects corresponding to the account information of the target account according to the correspondence between the account information and the verification service objects;
and the sequencing subunit is configured to sequence the plurality of verification service objects according to the stability of the plurality of verification service objects to obtain a verification service queue corresponding to the target account.
Optionally, the apparatus further comprises:
an integrity check module configured to detect integrity of the identity information to be verified before the target verification service object is updated, where the integrity of the identity information to be verified includes information integrity or information loss;
the service object updating module is further configured to update the target verification service object when the integrity of the identity information to be verified is complete;
and the prompt information generating module is configured to generate prompt information for re-inputting the identity information when the integrity of the identity information to be verified is information loss.
According to a third aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform any of the above described authentication methods.
In a fourth aspect of the embodiments of the present disclosure, a non-transitory computer-readable storage medium is provided, in which instructions, when executed by a processor of a mobile terminal, enable the mobile terminal to perform one of the above-mentioned authentication methods.
According to a fifth aspect of embodiments of the present disclosure, there is provided an application program/computer program product which, when run on a computer, causes the computer to perform the steps of the authentication method of any one of the above embodiments.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the identity authentication method, the identity authentication device, the electronic equipment and the storage medium provided by the embodiment of the disclosure, when the identity information to be authenticated of the target account is acquired, the target authentication service object corresponding to the target account is determined, whether the identity information to be authenticated of the target account is matched with the target identity information is verified through the target authentication service object, if the authentication fails, the target authentication service object is updated until the updated target authentication service object can successfully authenticate the identity information to be authenticated of the target account. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the authentication efficiency can be improved. The problem of low identity authentication security caused by directly switching to a manual processing flow when authentication fails can be solved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a method of identity verification in accordance with an exemplary embodiment;
FIG. 2 is a flowchart of one embodiment of step S120 of FIG. 1;
FIG. 3 is a flowchart of one embodiment of step S130 of FIG. 1;
FIG. 4 is a block diagram illustrating an authentication device in accordance with an exemplary embodiment;
FIG. 5 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flow chart illustrating a method of identity verification according to an exemplary embodiment, which may include the following steps, as shown in fig. 1:
in step S110, when an authentication request of a target account is received, to-be-authenticated identity information of the target account is acquired.
Generally, when a user opens a terminal device such as a mobile phone or uses some application services on the terminal, the user, that is, the identity information of an account is verified, for example, the account unlocks the terminal or logs in some application services by inputting a fingerprint, a face image, or the like, so as to improve the security of the information. The target account may be any account, and this is not specifically limited in this disclosure. Moreover, the identity information to be verified may be a fingerprint, a face image, or the like, which is not particularly limited in this disclosure.
In step S120, a target authentication service object corresponding to the target account is determined, and whether the identity information to be authenticated matches the target identity information of the target account is authenticated through the target authentication service object.
Specifically, the target account has account information such as an application version and a mobile phone system version used by the target account, and an available authentication service object can be determined according to the account information of the target account, that is, each account corresponds to one or more available authentication service objects. The usable verification service objects corresponding to the target account can be target verification service objects corresponding to the target account, and the target verification service objects are not specifically limited in the embodiment of the disclosure. And whether the identity information to be verified is matched with the target identity information of the target account can be verified through the target verification service object.
In step S130, when the verification result of the target verification service object is verification failure, the target verification service object is updated, and whether the identity information to be verified matches the target identity information is verified through the updated target verification service object until the verification result of the updated target verification service object is verification success.
Specifically, different verification service objects are usually provided by different service providers, and for example, when the face of the target account is identified and verified, a plurality of face identification modules provided by the service providers may verify the face image of the target account through their own face identification technologies.
In general, different service providers provide different verification service objects with different advantages or disadvantages, for example, some service providers provide verification service objects suitable for face verification in a light-rich environment, and some service providers provide verification service objects with greater advantages in a light-deficient environment, and so on. Therefore, when the authentication of the target account for the to-be-authenticated identity information fails through the target authentication service object, the target authentication service object can be updated, that is, the to-be-authenticated identity information is authenticated through other usable authentication service objects. In the embodiment of the present disclosure, there may be a plurality of usable authentication service objects, and therefore, the identity information to be authenticated may be authenticated one by one until the authentication result of the updated target authentication service object is successful.
According to the identity authentication method provided by the embodiment of the disclosure, when the identity information to be authenticated of the target account is acquired, the target authentication service object corresponding to the target account is determined, whether the identity information to be authenticated of the target account is matched with the target identity information is verified through the target authentication service object, and if the authentication fails, the target authentication service object is updated until the updated target authentication service object can successfully authenticate the identity information to be authenticated of the target account. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the efficiency of identity verification can be improved. The problem of low identity authentication security caused by directly switching to a manual processing flow when authentication fails can be solved.
On the basis of the above embodiment, as shown in fig. 2, the step S120 may include the following steps:
in step S121, a verification service queue corresponding to the target account is determined according to the account information of the target account.
The verification service queue comprises a plurality of verification service objects, the verification service objects are sorted according to the sequence of high stability to low stability, and the stability of each verification service object is determined by the historical verification success rate of the verification service object.
As an implementation manner of the embodiment of the present disclosure, determining a verification service queue corresponding to a target account according to account information of the target account may include the following two steps:
step 1, if a pre-established verification service queue does not exist locally, determining a plurality of verification service objects corresponding to account information of a target account according to the corresponding relation between the account information and the verification service objects;
and 2, sequencing the plurality of verification service objects according to the stability of the plurality of verification service objects to obtain a verification service queue corresponding to the target account.
Specifically, if the target account is authenticated for the first time, a pre-established authentication service queue does not exist locally; if the target account is not authenticated for the first time, then a pre-established authentication service queue exists locally. Therefore, when determining the verification service queue corresponding to the target account, whether a pre-established verification service queue exists locally may be checked first, and if the pre-established verification service queue does not exist locally, a plurality of verification service objects corresponding to the account information of the target account may be determined according to the corresponding relationship between the account information and the verification service objects.
Also, for each verification service object, the stability of the verification service object may be determined by the historical verification success rate of the verification service object. It can be understood that, the historical verification success rate of a verification service object is higher, and then, the stability of the verification service object is higher; conversely, if the historical verification success rate of a verification service object is low, the stability of the verification service object is low.
After the stability of the multiple verification service objects is determined, the multiple verification service objects may be sorted according to the stability of the multiple verification service objects, that is, the multiple verification service objects included in the verification service queue are sorted in order from high stability to low stability, so that the subsequent step performs identity verification on the identity information to be verified according to the verification service objects with high stability to low stability.
In step S122, the verification service object with the highest stability in the verification service queue is determined as the target verification service object corresponding to the target account.
In step S123, it is verified whether the identity information to be verified matches the target identity information of the target account through the target verification service object.
Because the verification service queue comprises a plurality of verification service objects with high stability and low stability, and when the information to be verified is verified through the verification service objects with high stability, the success rate of verification is high, the verification service object with the highest stability in the verification service queue can be determined as the target verification service object corresponding to the target account, and whether the identity information to be verified is matched with the target identity information of the target account is verified through the target verification service object.
The authentication service objects with the highest stability are determined as the target authentication service objects corresponding to the target account, and whether the identity information to be authenticated is matched with the target identity information of the target account or not is verified through the target authentication service objects, so that the identity information authentication efficiency can be greatly improved.
On the basis of the embodiment shown in fig. 2, the method provided by the embodiment of the present disclosure may further include the following steps:
step S140, when the verification result returned by the target verification service object is the preset error code information, counting the number of times that the target verification service object returns the preset error code information.
And step S150, when the times are more than the preset times, removing the target verification service object from the verification service queue to obtain an updated verification service queue.
In order to improve the verification efficiency, the verification failure times of the target verification service object can be limited by counting the times of the target verification service object returning the preset error code information, so that the target verification service object is prevented from performing unlimited verification when the target verification service object fails to verify the to-be-verified information. Specifically, when the number of times that the target verification service object returns the preset error code information is greater than the preset number of times, it indicates that the success rate of the target verification service object for verifying the to-be-verified information is low, and therefore, the target verification service object can be removed from the verification service queue to obtain an updated verification service queue, that is, the verification service object ranked second in the original verification service queue is the head verification service object of the updated verification service queue.
It can be understood that the preset number of times may be set according to actual situations, and this is not specifically limited in the embodiments of the present disclosure.
Therefore, according to the technical scheme provided by the embodiment of the disclosure, when the number of times that the target verification service object returns the preset error code information is greater than the preset number of times, the target verification service object is removed from the verification service queue, so that the verification service queue with a low verification success rate can be removed, and the verification efficiency is improved.
After obtaining the updated authentication service queue, in an embodiment, as shown in fig. 3, S130 updates the target authentication service object, and verifies whether the identity information to be authenticated matches the target identity information through the updated target authentication service object until the authentication result of the updated target authentication service object is successful, which may include the following steps:
s131, the verification service object with the highest stability in the updated verification service queue is determined as the updated target verification service object.
S132, verifying whether the identity information to be verified is matched with the target identity information of the target account through the updated target verification service object.
Specifically, when the information to be verified is verified by the verification service object with higher stability in the updated verification service queue, the success rate of verification is higher, so that in order to improve the success rate of verification, the verification service object with the highest stability in the updated verification service queue may be determined as the updated target verification service object, and whether the identity information to be verified is matched with the target identity information of the target account is verified by the updated target verification service object.
S133, when the verification result of the updated target verification service object is verification failure, the verification service queue and the target verification service object are continuously updated until the verification result of the updated target verification service object is verification success.
Specifically, when the verification result of the updated target verification service object is verification failure, it indicates that the updated target verification service object cannot successfully verify the identity information to be verified, so that the updated target verification service object may be removed from the verification service queue, the updated verification service queue is obtained again, and the verification service object with the highest stability is selected from the updated verification service queue obtained again as the updated target verification service object until the verification result of the updated target verification service object is verification success. Therefore, according to the technical scheme provided by the embodiment of the disclosure, when the verification result is verification failure, the target verification service object is automatically switched, so that the efficiency of identity verification can be improved to improve the efficiency of verification.
It should be noted that, in practical application, there may be a case that the updated verification results of the target verification service object are all verification failures, that is, the target verification service object cannot verify the identity information to be verified, and at this time, manual verification may be performed manually.
In another embodiment provided by the present disclosure, based on the above embodiment, the method may further include the following steps:
step S160, before updating the target authentication service object, detecting the integrity of the identity information to be authenticated.
The integrity of the identity information to be verified comprises the integrity of the information or the absence of the information.
In practical applications, once the integrity of the identity information to be verified is information loss, the verification effect of the target verification service object is directly affected, for example, when face recognition verification is performed, if a face image provided by a target account is incomplete or an image with dark light, the recognition effect is likely to be affected, which obviously belongs to verification failure caused by an account side, and therefore, before the target verification service object is updated, the integrity of the identity information to be verified can be detected.
Step S170, if the integrity of the identity information to be verified is complete, the target verification service object is updated.
If the integrity of the identity information to be verified is complete, the probability that the identity information to be verified provided by the account side causes verification failure is very low, and the verification failure is probably caused by the target verification service object, so that the target verification service object can be updated to continuously verify the identity information to be verified through the updated verification service object.
And step S180, if the integrity of the identity information to be verified is information loss, generating prompt information for re-inputting the identity information.
If the integrity of the identity information to be verified is information loss, the possibility that the identity information to be verified provided by the account side causes verification failure is high, namely the verification failure is caused by the fact that the identity information to be verified provided by the account side is incomplete, therefore, prompt information for re-inputting the identity information is generated to prompt the account to re-upload the identity information to be verified, and therefore verification efficiency is improved.
Therefore, according to the technical scheme provided by the embodiment of the disclosure, when the verification result is verification failure, the account side and the verification service object are considered comprehensively, if the verification failure is caused by the lack of the information of the to-be-verified identity information provided by the account side, prompt information for re-inputting the identity information is generated, and if the verification failure is caused by the verification service object, the target verification service object is updated, so that the verification success rate and the verification efficiency are provided.
Fig. 4 is a block diagram illustrating an authentication device according to an example embodiment. Referring to fig. 4, the apparatus includes:
the identity information to be verified acquisition module 410 is configured to acquire identity information to be verified of a target account when an identity verification request of the target account is received;
a target authentication service object determining module 420, configured to determine a target authentication service object corresponding to the target account, and verify whether the identity information to be verified matches the target identity information of the target account through the target authentication service object;
a target authentication service object update module 430 configured to update the target authentication service object when the authentication result of the target authentication service object is authentication failure;
the identity information matching module 440 is configured to verify, by the updated target verification service object, whether the identity information to be verified matches the target identity information until the verification result of the updated target verification service object is successful.
According to the technical scheme provided by the embodiment of the disclosure, when the identity information to be verified of the target account is acquired, the target verification service object corresponding to the target account is determined, whether the identity information to be verified of the target account is matched with the target identity information is verified through the target verification service object, if the verification fails, the target verification service object is updated until the updated target verification service object can successfully verify the identity information to be verified of the target account. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the authentication efficiency can be improved. The problem of low identity authentication security caused by directly switching to a manual processing flow when authentication fails can be solved.
In yet another embodiment provided by the present disclosure, the target verification service object determination module includes:
the verification service queue determining unit is configured to determine a verification service queue corresponding to the target account according to the account information of the target account, wherein the verification service queue comprises a plurality of verification service objects, the verification service objects are sorted according to a sequence from high stability to low stability, and the stability of each verification service object is determined by the historical verification success rate of the verification service object;
the target verification service object determining unit is configured to determine the verification service object with the highest stability in the verification service queue as a target verification service object corresponding to a target account;
and the identity information matching unit is configured to verify whether the identity information to be verified is matched with the target identity information of the target account through the target verification service object.
In yet another embodiment provided by the present disclosure, the apparatus further comprises:
the frequency counting module is configured to count the frequency of returning the preset error code information by the target verification service object when the verification result returned by the target verification service object is the preset error code information;
and the verification service object removing module is configured to remove the target verification service object from the verification service queue to obtain an updated verification service queue when the number of times is greater than a preset number of times.
In yet another embodiment provided by the present disclosure, the target verification service object update module includes:
a target verification service object updating unit configured to determine a verification service object with the highest stability in the updated verification service queue as an updated target verification service object;
the identity information matching module comprises:
the identity information matching unit is configured to verify whether the identity information to be verified is matched with the target identity information of the target account through the updated target verification service object;
and the updating unit is configured to continuously update the verification service queue and the target verification service object when the verification result of the updated target verification service object is verification failure until the verification result of the updated target verification service object is verification success.
In another embodiment provided by the present disclosure, the validation service queue determining unit includes:
the verification service object determining subunit is configured to determine, when a pre-established verification service queue does not exist locally, a plurality of verification service objects corresponding to the account information of the target account according to the correspondence between the account information and the verification service objects;
and the sequencing subunit is configured to sequence the plurality of verification service objects according to the stability of the plurality of verification service objects to obtain a verification service queue corresponding to the target account.
In yet another embodiment provided by the present disclosure, the apparatus further comprises:
an integrity check module configured to detect integrity of the identity information to be verified before the target verification service object is updated, where the integrity of the identity information to be verified includes information integrity or information loss;
the service object updating module is further configured to update the target verification service object when the integrity of the identity information to be verified is complete;
and the prompt information generating module is configured to generate prompt information for re-inputting the identity information when the integrity of the identity information to be verified is information loss.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 5 is a block diagram illustrating an apparatus 500 for presenting a group according to an example embodiment. For example, the apparatus 500 may be provided as a server. Referring to fig. 5, the apparatus 500 includes a processing component 522 that further includes one or more processors and memory resources, represented by memory 532, for storing instructions, such as applications, that are executable by the processing component 522. The application programs stored in memory 532 may include one or more modules that each correspond to a set of instructions. Further, the processing component 522 is configured to execute the instructions to perform the authentication method of the first aspect.
The apparatus 500 may also include a power component 526 configured to perform power management of the apparatus 500, a wired or wireless network interface 550 configured to connect the apparatus 500 to a network, and an input/output (I/O) interface 558. The apparatus 500 may operate based on an operating system stored in the memory 532, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
According to the technical scheme provided by the embodiment of the disclosure, when the identity information to be verified of the target account is acquired, the target verification service object corresponding to the target account is determined, whether the identity information to be verified of the target account is matched with the target identity information is verified through the target verification service object, if the verification fails, the target verification service object is updated until the updated target verification service object can successfully verify the identity information to be verified of the target account. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the authentication efficiency can be improved. The problem of low identity authentication security caused by directly switching to a manual processing flow when authentication fails can be solved.
Embodiments of the present disclosure also provide a non-transitory computer-readable storage medium, where instructions in the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform the above-mentioned authentication method.
According to the technical scheme provided by the embodiment of the disclosure, when the identity information to be verified of the target account is acquired, the target verification service object corresponding to the target account is determined, whether the identity information to be verified of the target account is matched with the target identity information is verified through the target verification service object, if the verification fails, the target verification service object is updated until the updated target verification service object can successfully verify the identity information to be verified of the target account. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the authentication efficiency can be improved. The problem of low identity authentication security caused by directly switching to a manual processing flow when authentication fails can be solved.
There is also provided, in accordance with an embodiment of the present disclosure, an application program/computer program product, and in yet another embodiment provided by the present disclosure, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the steps of the authentication method described in any of the above embodiments.
According to the technical scheme provided by the embodiment of the disclosure, when the identity information to be verified of the target account is acquired, the target verification service object corresponding to the target account is determined, whether the identity information to be verified of the target account is matched with the target identity information is verified through the target verification service object, if the verification fails, the target verification service object is updated until the updated target verification service object can successfully verify the identity information to be verified of the target account. In the embodiment of the disclosure, when the verification result is that the verification fails, the target verification service object is automatically switched, so that the authentication efficiency can be improved. The problem of low identity authentication security caused by directly switching to a manual processing flow when authentication fails can be solved.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the disclosure are, in whole or in part, generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions can be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, DSL (Digital Subscriber Line)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD (Digital Versatile Disk)), or a semiconductor medium (e.g., an SSD (Solid State Disk)), etc.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. An identity verification method, comprising:
when an identity authentication request of a target account is received, acquiring identity information to be authenticated of the target account;
determining a target verification service object corresponding to the target account, and verifying whether the identity information to be verified is matched with the target identity information of the target account through the target verification service object;
and when the verification result of the target verification service object is verification failure, updating the target verification service object, and verifying whether the identity information to be verified is matched with the target identity information through the updated target verification service object until the verification result of the updated target verification service object is verification success.
2. The method of claim 1, wherein the determining a target authentication service object corresponding to the target account and verifying whether the identity information to be authenticated matches the target identity information of the target account through the target authentication service object comprises:
determining a verification service queue corresponding to the target account according to the account information of the target account, wherein the verification service queue comprises a plurality of verification service objects, the verification service objects are sequenced from high to low in stability, and the stability of each verification service object is determined by the historical verification success rate of the verification service object;
determining the verification service object with the highest stability in the verification service queue as a target verification service object corresponding to a target account;
and verifying whether the identity information to be verified is matched with the target identity information of the target account or not through the target verification service object.
3. The method of claim 2, further comprising:
when the verification result returned by the target verification service object is preset error code information, counting the times of returning the preset error code information by the target verification service object;
and when the times are greater than the preset times, removing the target verification service object from the verification service queue to obtain an updated verification service queue.
4. The method according to claim 3, wherein the updating the target authentication service object and verifying whether the identity information to be authenticated matches the target identity information through the updated target authentication service object until the verification result of the updated target authentication service object is successful comprises:
determining the verification service object with the highest stability in the updated verification service queue as an updated target verification service object;
verifying whether the identity information to be verified is matched with the target identity information of the target account or not through the updated target verification service object;
and when the verification result of the updated target verification service object is verification failure, continuously updating the verification service queue and the target verification service object until the verification result of the updated target verification service object is verification success.
5. The method according to any one of claims 2 to 4, wherein the determining the validation service queue corresponding to the target account according to the account information of the target account comprises:
if the pre-established verification service queue does not exist locally, determining a plurality of verification service objects corresponding to the account information of the target account according to the corresponding relation between the account information and the verification service objects;
and sequencing the verification service objects according to the stability of the verification service objects to obtain a verification service queue corresponding to the target account.
6. The method according to any one of claims 2 to 4, further comprising:
before the target verification service object is updated, detecting the integrity of the identity information to be verified, wherein the integrity of the identity information to be verified comprises information integrity or information loss;
if the integrity of the identity information to be verified is complete, executing the step of updating the target verification service object;
and if the integrity of the identity information to be verified is information loss, generating prompt information for re-inputting the identity information.
7. An authentication apparatus, comprising:
the authentication method comprises the steps that an identity information acquisition module to be authenticated is configured to acquire identity information to be authenticated of a target account when an identity authentication request of the target account is received;
a target verification service object determination module configured to determine a target verification service object corresponding to the target account, and verify whether the identity information to be verified matches the target identity information of the target account through the target verification service object;
the target verification service object updating module is configured to update the target verification service object when the verification result of the target verification service object is verification failure;
and the identity information matching module is configured to verify whether the identity information to be verified is matched with the target identity information through the updated target verification service object until the verification result of the updated target verification service object is successful.
8. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the authentication method of any one of claims 1-6.
9. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor of a mobile terminal, enable the mobile terminal to perform an authentication method, the method comprising the steps of the authentication method of any one of claims 1-6.
10. An application/computer program product, characterized in that it causes a computer to perform the steps of the authentication method according to any one of claims 1-6 when run on the computer.
CN202110713559.9A 2021-06-25 2021-06-25 Identity verification method, device, electronic equipment and storage medium Active CN113536266B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110713559.9A CN113536266B (en) 2021-06-25 2021-06-25 Identity verification method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110713559.9A CN113536266B (en) 2021-06-25 2021-06-25 Identity verification method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113536266A true CN113536266A (en) 2021-10-22
CN113536266B CN113536266B (en) 2024-03-01

Family

ID=78096801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110713559.9A Active CN113536266B (en) 2021-06-25 2021-06-25 Identity verification method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113536266B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
WO2020015487A1 (en) * 2018-07-18 2020-01-23 阿里巴巴集团控股有限公司 Identity verification method, login method, apparatuses, and computer device
CN110838010A (en) * 2019-10-30 2020-02-25 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN110868327A (en) * 2019-11-28 2020-03-06 武汉极意网络科技有限公司 Behavior verification control method, behavior verification control device, behavior verification control equipment and storage medium
CN111510437A (en) * 2020-03-28 2020-08-07 杭州迪普科技股份有限公司 Communication method and communication device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681316A (en) * 2016-02-02 2016-06-15 腾讯科技(深圳)有限公司 Identity verification method and device
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
WO2020015487A1 (en) * 2018-07-18 2020-01-23 阿里巴巴集团控股有限公司 Identity verification method, login method, apparatuses, and computer device
CN110838010A (en) * 2019-10-30 2020-02-25 腾讯科技(深圳)有限公司 Service processing method, device, terminal, server and storage medium
CN110868327A (en) * 2019-11-28 2020-03-06 武汉极意网络科技有限公司 Behavior verification control method, behavior verification control device, behavior verification control equipment and storage medium
CN111510437A (en) * 2020-03-28 2020-08-07 杭州迪普科技股份有限公司 Communication method and communication device

Also Published As

Publication number Publication date
CN113536266B (en) 2024-03-01

Similar Documents

Publication Publication Date Title
KR101814989B1 (en) Method of detecting fraud financial trade and server performing the same
US20230045378A1 (en) Non-repeatable challenge-response authentication
US9509688B1 (en) Providing malicious identity profiles from failed authentication attempts involving biometrics
CN106909811B (en) Method and device for processing user identification
US9235840B2 (en) Electronic transaction notification system and method
CN104980402B (en) Method and device for identifying malicious operation
CN105100108A (en) Login authentication method, device and system based on face identification
CN113746638B (en) NFT storage method, NFT restoration method, computer device, and storage medium
CN105141427A (en) Login authentication method, device and system based on voiceprint recognition
KR20160085276A (en) Method, device, and system for updating authentication informatoin
TW201426593A (en) Method and apparatus for information verification
CN110336781A (en) A kind of method and apparatus based on browser identification terminal uniqueness
CN110691085A (en) Login method, login device, password management system and computer readable medium
WO2015106710A1 (en) Contact information processing method, apparatus, and system
US20210342841A1 (en) Mobile authentification method via peer mobiles
CN111552942A (en) Identity authentication method, system, device and computer storage medium
CN105704133A (en) Method, terminal and server for data synchronism
US11037146B2 (en) Managing product returns associated with a user device
CN110546638A (en) Improvements in biometric authentication
CN116055769B (en) CID advertisement early warning method, apparatus, computer device and storage medium
CN113536266B (en) Identity verification method, device, electronic equipment and storage medium
CN115408298A (en) Test method, device and system
CN114978749A (en) Login authentication method and system, storage medium and electronic equipment
CN113344598A (en) Data verification method, device, medium and electronic equipment
CN110418331B (en) Unlocking method, unlocking device, mobile terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant