CN115134118A - Method and device for verifying identity of internet registered user, server and storage medium - Google Patents

Method and device for verifying identity of internet registered user, server and storage medium Download PDF

Info

Publication number
CN115134118A
CN115134118A CN202210577577.3A CN202210577577A CN115134118A CN 115134118 A CN115134118 A CN 115134118A CN 202210577577 A CN202210577577 A CN 202210577577A CN 115134118 A CN115134118 A CN 115134118A
Authority
CN
China
Prior art keywords
mobile phone
phone number
internet service
user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210577577.3A
Other languages
Chinese (zh)
Other versions
CN115134118B (en
Inventor
孟然
刘凯
胡宇
张显金
彭莱
高鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202210577577.3A priority Critical patent/CN115134118B/en
Publication of CN115134118A publication Critical patent/CN115134118A/en
Application granted granted Critical
Publication of CN115134118B publication Critical patent/CN115134118B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Abstract

The application relates to the technical field of communication, and discloses a method for verifying the identity of an internet registered user, which comprises the following steps: receiving a first handset number and a second handset number corresponding to the same internet service; acquiring a first user security identity SUKa corresponding to a first mobile phone number; acquiring a second user security identity SUKb corresponding to a second mobile phone number; comparing SUKa with SUKb and transmitting the comparison result. The identity authentication method and the identity authentication device can determine whether the user identity corresponding to the first user safety identity is the same as the user identity corresponding to the second user safety identity, thereby determining whether the user corresponding to the bound mobile phone number is the same as the home subscriber of the mobile phone number to be changed and bound, and realizing the identity authentication of the home subscriber of the mobile phone number to be changed and bound. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously. The application also discloses a device, a server and a storage medium for verifying the identity of the internet registered user.

Description

Method and device for verifying identity of internet registered user, server and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for verifying an internet registered user identity, a server, and a storage medium.
Background
Currently, with the development of the era of mobile internet, mobile phone numbers have become an important asset of telecom operators. In order to ensure the effective utilization of the assets, telecommunication operators can actively recycle the mobile phone numbers which are defaulted for a long time after the mobile phone numbers are issued to users. Meanwhile, the mobile phone number is recovered due to the request of the user for logging off the mobile phone number. The recycled mobile phone number is in a 'recycled' state. After the telecom operator recovers the mobile phone number and sets a time period, the recovered mobile phone number is issued to another new user, so that new number allocation of the mobile phone number is realized, and the issued mobile phone number is in an 'issued' state. Thus, for a telecommunications carrier, a cell phone number may be in an "issued" or "reclaimed" state as the cell phone number is issued and reclaimed. Due to the requirement of the real-name system of the mobile phone number, an operator can verify and record the identity information of the user when the mobile phone number is issued, so that one issued mobile phone number can be bound with one user, and the user bound with the mobile phone number is the home subscriber of the mobile phone number. The current home subscriber of the mobile phone number is the subscriber bound with the mobile phone number. The original home user of the mobile phone number is the user who has been bound with the mobile phone number and has released the binding relation at present.
When the user bound with the mobile phone number registers the user account of the internet service by using the mobile phone number, the internet service requires that the identity of the user is verified by using the mobile phone number, so that the real-name system of the internet service is realized by using the real-name system of the mobile phone number. To facilitate the provision of messaging notifications to the user, internet services require the user to bind their mobile phone number to the user account of the internet service. In addition, in order to facilitate memory, the user directly registers the internet service with the mobile phone number, so that the internet service generates a user account which is not sensed by the user for the user, and the mobile phone number is bound with the generated internet service user account. The user binds the mobile phone number with the internet service, and the system realizes that the mobile phone number is actually bound with the user account of the internet service. Therefore, the internet service maintains a binary binding relationship between the user account and the mobile phone number. The user bound to the user account of the internet service is the home user of the user account.
For the internet service, after the mobile phone number is bound with the user account of the internet service, the home subscriber corresponding to the mobile phone number and the home subscriber corresponding to the user account of the internet service should be the same user. And because the telecom operator gives and retrieves the mobile phone number, the existing home subscriber of the mobile phone number is different from the home subscriber when the mobile phone number is bound with the user account of the internet service, and the mobile phone number is determined as the 'secondary number' of the internet service. For example: service on the internet Y 1 After the user account of the user A is bound with the mobile phone number X of the user A, if the mobile phone number X is recovered from the user A by a telecom operator. For internet service Y 1 In other words, the mobile phone number X does not belong to the user a, and the mobile phone number X is the internet service Y 1 The "secondary number" of (1). The mobile number X may subsequently be issued by the telecommunications carrier to another new subscriber B. The mobile phone number X becomes the Internet service Y 1 After the secondary number of the internet service Y, once with the internet service Y 1 The user account number is unbound or the binding relationship is set as 'failure' or 'recovery', and the Internet service Y is processed 1 In other words, the mobile phone number X is no longer considered as a "secondary number". After the 'secondary number' is re-issued to the user B, the user B may log in the internet service Y bound by the user A by using the mobile phone number X 1 Or, the mobile phone number X can not be bound to the Internet service Y 1 The user account of user B. If the mobile phone number X and the internet service Y are the same 2 The user account number of the mobile phone number X has no binding relationship, and the change of the home subscriber of the mobile phone number X does not cause the mobile phone number X to become the internet service Y 2 The secondary number of (2).
At present, more and more users bind their own mobile phone numbers with their own internet services and log in their own user accounts registered in the bound internet services. A user may have multiple mobile phones or multiple mobile phone numbers, and therefore, the user often needs to change the mobile phone number bound to the internet service. However, the internet service cannot confirm the identity of the user who is changing the bound cell phone number. Based on the same reason, the malicious user can maliciously change the mobile phone number bound with the Internet service by the original user. For example: the malicious user can maliciously change the mobile phone number bound to the internet service through the mobile phone number and the birthday of the user of the internet service. Or, the malicious user can maliciously change the mobile phone number bound by the internet service through the application program which logs in the internet service on the mobile phone of the user of the internet service. Or the Internet service account of the friend or the family is maliciously bound with the mobile phone number of the user through the mobile phone of the friend or the family of the user.
In the process of implementing the embodiments of the present disclosure, it is found that at least the following problems exist in the related art: in the related art, the identity of the user of the mobile phone number to be changed and bound cannot be verified, so that whether the user corresponding to the mobile phone number bound to the internet service and the home user of the mobile phone number to be changed and bound are the same user cannot be determined, and therefore a malicious user may maliciously change the mobile phone number bound to the internet service.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview nor is intended to identify key/critical elements or to delineate the scope of such embodiments but rather as a prelude to the more detailed description that is presented later.
The embodiment of the disclosure provides a method and a device for verifying the identity of a registered user of the Internet, a server and a storage medium, which can verify the identity of the user of a mobile phone number to be changed and bound, so that a malicious user is difficult to maliciously change the mobile phone number bound to the Internet service.
In some embodiments, the method for verifying the identity of an internet registered user comprises: a first handset number and a second handset number corresponding to the same internet service are received. And acquiring a first user security identity SUKa corresponding to the first mobile phone number. And acquiring a second user security identity SUKb corresponding to the second mobile phone number. And comparing the SUKa with the SUKb, and sending a comparison result. The first mobile phone number is a mobile phone number bound with the internet service, and the SUKa is a user security identity corresponding to the first mobile phone number bound with the internet service; the second mobile phone number is a mobile phone number to be changed and bound, and the SUKb is a user security identity of a current home subscriber of the second mobile phone number.
In some embodiments, the apparatus for verifying the identity of an internet registered user comprises a processor and a memory storing program instructions, the processor being configured to, when executing the program instructions, perform the method for verifying the identity of an internet registered user as described above.
In some embodiments, the server comprises: the device for verifying the identity of the internet registered user is described above.
In some embodiments, the storage medium stores program instructions that, when executed, perform the above-described method for verifying the identity of an internet registered user.
The method and the device for verifying the identity of the internet registered user, the server and the storage medium provided by the embodiment of the disclosure can realize the following technical effects: the method comprises the steps of obtaining a first user safety identification corresponding to the binding of the mobile phone number bound with the Internet service and the Internet service, obtaining a second user safety identification of a current home user of the mobile phone number to be changed and bound, and then comparing the first user safety identification with the second user safety identification. The identity authentication method and the identity authentication device can determine whether the user identity corresponding to the first user safety identity is the same as the user identity corresponding to the second user safety identity, thereby determining whether the user corresponding to the bound mobile phone number and the home subscriber of the mobile phone number to be changed and bound are the same, and realizing the identity authentication of the home subscriber of the mobile phone number to be changed and bound. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the accompanying drawings and not in limitation thereof, in which elements having the same reference numeral designations are shown as like elements and not in limitation thereof, and wherein:
FIG. 1 is a schematic diagram of a system for verifying the identity of an Internet registered user provided by embodiments of the present disclosure;
FIG. 2 is a schematic diagram of a method for verifying the identity of an Internet registered user provided by embodiments of the present disclosure;
FIG. 3 is a schematic diagram of another method for verifying the identity of an Internet registered user provided by embodiments of the present disclosure;
FIG. 4 is a schematic diagram of another method for verifying the identity of an Internet registered user provided by embodiments of the present disclosure;
fig. 5 is a schematic diagram of an apparatus for verifying the identity of an internet registered user according to an embodiment of the present disclosure.
Detailed Description
So that the manner in which the features and advantages of the embodiments of the present disclosure can be understood in detail, a more particular description of the embodiments of the disclosure, briefly summarized above, may be had by reference to the appended drawings, which are included to illustrate, but are not intended to limit the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
The terms "first," "second," and the like in the description and claims of the embodiments of the disclosure and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged as appropriate for the embodiments of the disclosure described herein. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The term "plurality" means two or more unless otherwise specified.
In the embodiment of the present disclosure, the character "/" indicates that the preceding and following objects are in an or relationship. For example, A/B represents: a or B.
The term "and/or" is an associative relationship that describes objects, meaning that three relationships may exist. For example, a and/or B, represents: a or B, or A and B.
The term "correspond" may refer to an association or binding relationship, and a corresponds to B refers to an association or binding relationship between a and B.
As shown in fig. 1, an embodiment of the present disclosure provides a system for verifying an identity of an internet registered user, including: a plurality of internet service platforms, a plurality of telecommunications carriers, and a cell phone number binding service platform 102. The plurality of Internet service platforms comprise a first Internet service platform 100-1, a second Internet service platform 100-2, a third Internet service platform 100-3, … …, an Nth Internet service platform 100-4 and the like, wherein N is a positive integer. The plurality of telecommunications carriers includes a first telecommunications carrier platform 101-1, a second telecommunications carrier 101-2, and a third telecommunications carrier 101-3. Each internet service platform includes one or more internet services. Internet services include WeChat, QQ, Taobao, etc.
Optionally, the mobile phone number binding service platform establishes a second mapping table according to the mobile phone number sent by the telecom operator and the user security identity corresponding to the mobile phone number. The second mapping table reflects the mapping relation between the mobile phone number and the user security identity SUK. And the mobile phone number binding service platform receives a binding notification sent by the Internet service platform. And the mobile phone number binding service platform determines the mobile phone number and the internet service bound with the mobile phone number according to the binding notice, and further generates a first mapping table based on a second mapping table. The first mapping table reflects the mapping relation among the mobile phone number, the user safety identity SUK and the Internet service.
When the telecom operator issues the mobile phone number, the issued mobile phone number and the user security identity corresponding to the mobile phone number are sent to the mobile phone number binding service platform.
Further, the mobile phone number binding service platform establishes a second mapping table according to the mobile phone number sent by the telecom operator and the user security identity corresponding to the mobile phone number, including: and the mobile phone number binding service platform establishes a mapping relation between the mobile phone number sent by the telecom operator and the corresponding user security identity and stores the mapping relation to obtain a second mapping table.
Further, the mobile phone number binding service platform determines the mobile phone number and the internet service bound with the mobile phone number according to the binding notification, and then the mobile phone number binding service platform generates a first mapping table based on a second mapping table, including: and the mobile phone number binding service platform searches the user safety identity corresponding to the mobile phone number in the second mapping table. And determining the searched user security identity as the corresponding user security identity when the mobile phone number is bound with the internet service, and obtaining the mapping relation among the mobile phone number, the user security identity and the internet service. And storing the mapping relation to obtain a first mapping table.
Under the condition that the mobile phone number is bound with the Internet service, the Internet service platform corresponding to the Internet service sends a binding notice that the mobile phone number is bound with the Internet service to the mobile phone number binding service platform. The binding notification includes a cell phone number. Optionally, the binding notification further comprises an internet service ID. The mobile phone number is bound with the internet service, and the mobile phone number is bound with the user account of the internet service. And if the mobile phone number is successfully bound with the Internet service, the mobile phone number and the Internet service have a binding relationship.
Optionally, the mobile phone number binding service platform receives a binding notification sent by the internet service platform, determines the mobile phone number and the internet service bound to the mobile phone number according to the binding notification, and obtains a corresponding user security identity from a telecom operator according to the mobile phone number to generate a first mapping table. Therefore, the mobile phone number binding service platform obtains the user safety identity corresponding to the mobile phone number from the telecom operator in real time according to the mobile phone number in the binding notice sent by the Internet service platform, and hysteresis is avoided.
Further, the mobile phone number binding service platform acquires a corresponding user security identity from a telecom operator according to the mobile phone number, and the method comprises the following steps: and the mobile phone number binding service platform inquires a user safety identity of the current home subscriber corresponding to the mobile phone number from a telecom operator. Or, the mobile phone number binding service platform sends a user identity query request of the mobile phone number to the telecom operator, and triggers the telecom operator to query and feed back the user security identity of the current home user corresponding to the mobile phone number.
Further, the user security identity SUK is generated by: under the condition that a telecom operator sends a mobile phone number, a preset feature extraction algorithm is utilized to extract the features of the identity information of the home subscriber of the mobile phone number, and a user safety identity SUK corresponding to the mobile phone number is obtained. The identity information of the home subscriber is the identity card number of the home subscriber, or the identity information of the home subscriber is the identity card number and name of the home subscriber. Therefore, the identity information of the mobile phone number home subscriber is not explicitly reflected in the user safety identity corresponding to the mobile phone number, but the identity of the user can be uniquely distinguished, so that the mobile phone number binding service platform can identify the user according to the user safety identity, but cannot determine the identity of the user, and the safety and the confidentiality are improved.
Further, the preset feature extraction algorithm includes: hash algorithm (Hash algorithm); SHA256 Algorithm (Secure Hash Algorithm-256 ); feature extraction algorithms such as MD5 Algorithm (Message Digest Algorithm MD 5) or SM3 Algorithm (Cryptographic hash Algorithm).
The internet service ID is used to uniquely identify an internet service. The internet service ID may be composed of one or more of an internet service name, an IP address of the internet service, a character string corresponding to the internet service, or a data string of the internet service. The character string corresponding to the internet service is a self-defined character string. The data string of the internet service is a self-defined data string.
The mobile phone number binding service platform verifies the user identity corresponding to the received information by using the two established mapping tables and sends the verification result to the internet service platform providing the internet service so that the internet service platform executes related operation according to the verification result. The mobile phone number binding service platform can realize identity authentication of a malicious user, so that the malicious user can hardly maliciously change the mobile phone number bound to the internet service. The mobile phone number binding service platform can determine whether the current home subscriber of the mobile phone number is the same as the user when the mobile phone number is bound with the internet service, so that a new home subscriber of the mobile phone number is difficult to log in a user account of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced. The mobile phone number binding service platform can verify whether the mobile phone number is the secondary number of the internet service bound by the mobile phone number, so that a new home subscriber of the mobile phone number is difficult to log in a user account of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced.
Based on the system for verifying the identity of the internet registered user shown in fig. 1, in combination with fig. 2, an embodiment of the present disclosure provides a method for verifying the identity of the internet registered user, where the method includes:
step S201, the mobile phone number binding service platform receives a first mobile phone number and a second mobile phone number corresponding to the same Internet service. The first mobile phone number is a mobile phone number bound with the Internet service. The mobile phone number of the bound internet service includes a mobile phone number bound when the internet service is registered or a mobile phone number of the internet service directly bound. The second mobile phone number is the mobile phone number to be changed and bound.
Step S202, the mobile phone number binding service platform obtains a first user security identity SUKa corresponding to the first mobile phone number. And the SUKa is a user safety identity corresponding to the first mobile phone number when the first mobile phone number is bound with the Internet service. The user safety identification corresponding to the first mobile phone number is the user safety identification of the attributive user of the first mobile phone number.
Step S203, the mobile phone number binding service platform obtains a second user security identity SUKb corresponding to the second mobile phone number. And the SUKb is the user security identity of the current attributive user of the second mobile phone number.
And S204, comparing the SUKa with the SUKb by the mobile phone number binding service platform, and sending a comparison result.
By adopting the method for verifying the identity of the internet registered user provided by the embodiment of the disclosure, the security identity of the second user of the current home user of the mobile phone number to be changed and bound is obtained by obtaining the security identity of the first user corresponding to the binding of the mobile phone number bound with the internet service and the security identity of the second user, and then the security identity of the first user and the security identity of the second user are compared. The identity authentication method and the identity authentication device can determine whether the user identity corresponding to the first user safety identity is the same as the user identity corresponding to the second user safety identity, thereby determining whether the user corresponding to the bound mobile phone number and the home subscriber of the mobile phone number to be changed and bound are the same, and realizing the identity authentication of the home subscriber of the mobile phone number to be changed and bound. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
In some embodiments, the first cell phone number has been bound to a user account of an internet service, i.e. the user can log in to the internet service via the first cell phone number. And under the condition that the user needs to change the first mobile phone number bound with the same user account number on the Internet service into the second mobile phone number, determining the second mobile phone number as the mobile phone number to be changed and bound. For example, if the first mobile phone number a is already bound to the user account W1 of the wechat, and the user needs to change the first mobile phone number a bound to the user account W1 of the wechat to the second mobile phone number B, it is determined that the second mobile phone number B is the mobile phone number to be changed and bound. And the mobile phone number binding service platform acquires a user safety identity SUKa corresponding to the first mobile phone number when the first mobile phone number is bound with the Internet service. And acquiring a user security identity SUKb of the current home subscriber of the second mobile phone number. Then, the SUKa and SUKb are compared to be identical, and then the comparison result is transmitted. The method and the device can determine whether the user identity corresponding to the SUKa is the same as the user identity corresponding to the SUKb, thereby determining whether the user corresponding to the mobile phone number bound with the Internet service and the home subscriber of the mobile phone number to be changed are the same, and realizing the identity verification of the home subscriber of the mobile phone number to be changed. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
Optionally, the obtaining, by the mobile phone number binding service platform, a first user security identity SUKa corresponding to the first mobile phone number includes: and searching the first mobile phone number and the user security identity corresponding to the Internet service from the first mapping table to obtain the SUKa. The first mapping table reflects the mapping relation among the mobile phone number, the user safety identity and the Internet service. Therefore, the mobile phone number binding service platform can accurately obtain the first user security identity SUKa corresponding to the first mobile phone number from the first mapping table. So as to compare the SUKa with the SUKb to obtain a correct comparison result, and determine whether the user identity corresponding to the SUKa is the same as the user identity corresponding to the SUKb. Therefore, whether the user corresponding to the mobile phone number bound with the Internet service and the home subscriber of the mobile phone number to be changed and bound are the same user can be determined. The identity authentication of the attributive user of the mobile phone number to be changed and bound is realized. Therefore, a malicious user can hardly maliciously change the mobile phone number bound by the Internet service.
In some embodiments, there are one or more first mapping tables. In the case that only one first mapping table exists, all mapping relations reflecting the mobile phone numbers, the user security identities and the internet services are stored in the first mapping table. As shown in table 1, table 1 is an example table of the first mapping table. Wherein the internet service ID is used to characterize the internet service.
Mobile phone number Internet service ID User security identity
Mobile phone number 1 QQ123 SUK1
Mobile phone number 1 WEIXIN123 SUK1
Mobile phone number 1 TAOBAO123 SUK1
Mobile phone number 2 QQ123 SUK2
Mobile phone number 3 TAOBAO123 SUK3
Mobile phone number 3 QQ123 SUK3
Mobile phone number 4 YOUKTV123 SUK1
TABLE 1
In some embodiments, as shown in table 1, in the case that the mobile phone number is "mobile phone number 1" and the ID of the internet service to which the mobile phone number is bound is "QQ 123", the user security identity is "SUK 1". In the case where the mobile phone number is "mobile phone number 1" and the ID of the internet service to which the mobile phone number is bound is "WEIXIN 123", the user security identity is "SUK 1". In case that the mobile phone number is 'mobile phone number 1' and the ID of the internet service to which the mobile phone number is bound is 'TAOBAO 123', the user security identity is 'SUK 1'. In the case where the mobile phone number is "mobile phone number 2" and the ID of the internet service to which the mobile phone number is bound is "QQ 123", the user security identity is "SUK 2". In case that the mobile phone number is 'mobile phone number 3' and the ID of the internet service to which the mobile phone number is bound is 'TAOBAO 123', the user security identity is 'SUK 3'. In the case where the mobile phone number is "mobile phone number 3" and the ID of the internet service to which the mobile phone number is bound is "QQ 123", the user security identity is "SUK 3". In the case that the mobile phone number is "mobile phone number 4" and the ID of the internet service to which the mobile phone number is bound is "you ktv 123", the user security identity is "SUK 1".
In some embodiments, in the case that there are multiple first mapping tables, all mappings reflecting mobile phone numbers, user security identities and the same internet service are stored in the same first mapping table. And under the condition that the Internet services are different, the corresponding mapping relation is stored in different first mapping tables. As shown in table 2, table 2 is an example table of the first mapping table in which mapping relationships corresponding to the QQ internet services are stored.
Mobile phone number User security identity
Mobile phone number 1 SUK1
Mobile phone number 2 SUK2
Mobile phone number 3 SUK3
TABLE 2
In some embodiments, as shown in table 2, in the case that the internet service is QQ, the user security identity corresponding to the mobile phone number "mobile phone number 1" is "SUK 1". The user security identity corresponding to the mobile phone number "mobile phone number 2" is "SUK 2". The user security identity corresponding to the mobile phone number 3 is "SUK 3".
In some embodiments, the mobile phone number binding service platform receives a mobile phone number sent by a telecom operator and a user security identity corresponding to the mobile phone number, and establishes a second mapping table according to the mobile phone number and the user security identity corresponding to the mobile phone number. As shown in table 3, table 3 is an example table of the second mapping table.
Mobile phone number User security identity
Mobile phone number 1 SUK1
Mobile phone number 2 SUK4
Mobile phone number 3 SUK3
Mobile phone number 4 SUK1
TABLE 3
In some embodiments, as shown in table 3, in the case that the mobile phone number is "mobile phone number 1", the user security identity of the mobile phone number is "SUK 1". In the case where the mobile phone number is "mobile phone number 2", the user security identity of the mobile phone number is "SUK 4". In the case where the mobile phone number is "mobile phone number 3", the user security identity of the mobile phone number is "SUK 3". In the case where the mobile phone number is "mobile phone number 4", the user security identity of the mobile phone number is "SUK 1".
Optionally, the determining, by the mobile phone number binding service platform according to the binding notification, the mobile phone number and the internet service bound to the mobile phone number includes: and the mobile phone number binding service platform analyzes the binding notice to obtain the mobile phone number and an Internet service ID, wherein the Internet service ID is the ID of the Internet service bound with the mobile phone number. In this way, the binding notification sent by the internet service platform carries the ID of the internet service bound with the mobile phone number. Therefore, the mobile phone number and the internet service bound with the mobile phone number can be obtained by analyzing the binding notification.
Optionally, the determining, by the mobile phone number binding service platform according to the binding notification, the mobile phone number and the internet service bound to the mobile phone number includes: and the mobile phone number binding service platform analyzes the binding notice to obtain the mobile phone number. And determining the internet service corresponding to the sending address of the binding notification as the internet service bound with the mobile phone number. Wherein, the sending address is the IP address of the Internet service platform sending the binding notification. Although the binding notification does not carry the ID of the internet service, the binding notification does not carry the user account of the internet service bound by the mobile phone number. But since the sending address is the IP address of the internet service platform sending the binding notification. In this way, the internet service platform sending the message can be determined by binding the sending address of the notification, so as to determine the internet service.
Optionally, the obtaining, by the mobile phone number binding service platform, a second user security identity SUKb corresponding to the second mobile phone number includes: and the mobile phone number binding service platform acquires the corresponding SUKb from the telecom operator according to the second mobile phone number. Therefore, the mobile phone number binding service platform can acquire the second user security identity SUKb corresponding to the second mobile phone number in real time from a telecom operator, has no hysteresis, is convenient to compare the SUKb with the SUKa to obtain an accurate comparison result, and can determine whether the user corresponding to the mobile phone number bound with the internet service and the home subscriber of the mobile phone number bound to be changed are the same user according to the comparison result. The identity authentication of the attributive user of the mobile phone number to be changed and bound is realized. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
Further, the acquiring, by the mobile phone number binding service platform, the corresponding SUKb from the telecom operator according to the second mobile phone number includes: and the mobile phone number binding service platform inquires the user security identity of the current home subscriber corresponding to the second mobile phone number from the telecom operator to obtain the SUKb. Or, the mobile phone number binding service platform sends a user identity query request of the second mobile phone number to the telecom operator, and triggers the telecom operator to query and feed back a user security identity SUKb of the current home subscriber corresponding to the second mobile phone number.
Optionally, the obtaining, by the mobile phone number binding service platform, a second user security identity SUKb corresponding to the second mobile phone number includes: and the mobile phone number binding service platform searches the second mobile phone number in the second mapping table to obtain the corresponding SUKb. The second mapping table reflects the mapping relation between the mobile phone number and the user security identity. Therefore, the mobile phone number binding service platform can obtain the correct SUKb corresponding to the second mobile phone number in the second mapping table, so that the SUKb and the SUKa can be conveniently compared to obtain an accurate comparison result, and whether the user corresponding to the mobile phone number bound to the internet service and the attribution user of the mobile phone number bound to be changed are the same user or not can be determined according to the comparison result. The identity authentication of the attributive user of the mobile phone number to be changed and bound is realized. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
Optionally, the sending, by the mobile phone number binding service platform, a comparison result includes: and the mobile phone number binding service platform sends the comparison result of the SUKa and the SUKb to an Internet service platform for providing Internet service, so that the Internet service platform executes related operations according to the comparison result. The Internet service platform for providing the Internet service is the Internet service platform for sending the first mobile phone number and the second mobile phone number.
Optionally, the related operations comprise: the method comprises the following steps of changing and binding operation between a first mobile phone number and a second mobile phone number, newly adding binding operation between the first mobile phone number and the second mobile phone number, or rejecting the binding operation between the second mobile phone number and internet service. The change binding operation between the first mobile phone number and the second mobile phone number is to release the binding relationship between the first mobile phone number and the internet service and establish the binding relationship between the second mobile phone number and the internet service. And the newly increased binding operation between the first mobile phone number and the second mobile phone number is to directly establish the binding relationship between the second mobile phone number and the internet service so as to bind the first mobile phone number and the second mobile phone number with the same internet service.
In some embodiments, in the case that the comparison result is that SUKa and SUKb are the same, the internet service platform performs a change binding operation between the first mobile phone number and the second mobile phone number, or performs a new binding operation between the first mobile phone number and the second mobile phone number. And under the condition that the comparison result is that the SUKa is not the same as the SUKb, the Internet service platform executes the binding operation which does not allow the second mobile phone number and the Internet service.
Therefore, the Internet service platform can determine whether the user corresponding to the bound mobile phone number and the home subscriber of the mobile phone number to be changed and bound are the same user according to the received comparison result, and the identity verification of the home subscriber of the mobile phone number to be changed and bound is realized. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
Further, when the comparison result is that SUKa is the same as SUKb and the binding notification sent by the internet service platform is received, the mobile phone number binding service platform stores the mapping relationship among the second mobile phone number, the corresponding internet service, and the user security identity SUKb in the first mapping table.
Further, under the condition that the internet service platform executes the change binding operation between the first mobile phone number and the second mobile phone number, the internet service platform sends a notification for removing the binding relation between the first mobile phone number and the internet service to the mobile phone number binding service platform, and the mobile phone number binding service platform marks the mapping relation between the first mobile phone number, the internet service bound by the first mobile phone number and the user security identity SUKa as invalid/recycled in the first mapping table. Or deleting the mapping relation between the first mobile phone number and the internet service and the user security identity SUKa bound to the first mobile phone number from the first mapping table. Further, the internet service platform can send a notification of the binding of the second mobile phone number and the internet service to the mobile phone number binding service platform, and the mobile phone number binding service platform stores the mapping relationship among the second mobile phone number, the corresponding internet service, and the user security identity SUKb in the first mapping table.
In some embodiments, the first phone number is phone number 1, and phone number 1 is already bound to the QQ internet service, that is, the home subscriber of phone number 1 binds a user account in the QQ internet service by using phone number 1. The home subscriber of the mobile phone number 1 wants to change the mobile phone number bound by the user account into a second mobile phone number. For example, the second phone number to be changed into the binding is phone number 4. And the Internet service platform corresponding to the QQ sends the mobile phone number 1 and the mobile phone number 4. The mobile phone number binding service platform receives the mobile phone number 1 and the mobile phone number 4. And finding out the SUK1 which is the user security identity and corresponds to the mobile phone number 1 and the QQ together from the first mapping table. The internet service platform finds the user security identity SUK1 of the current home subscriber of the mobile phone number 4 in the second mapping table. Comparing the two user security identities, the comparison result is the same, which is SUK 1. And sending the comparison result to an Internet service platform providing the QQ, wherein the Internet service platform executes the change binding operation between the first mobile phone number and the second mobile phone number, removes the binding relationship between the mobile phone number 1 and the user account of the QQ, and establishes the binding relationship between the mobile phone number 4 and the same user account of the QQ. Thereby changing the mobile phone number bound with the internet service from the mobile phone number 1 to the mobile phone number 4.
Based on the system for verifying the identity of the internet registered user shown in fig. 1, in combination with fig. 3, an embodiment of the present disclosure provides a method for verifying the identity of the internet registered user, where the method includes:
step S301, the mobile phone number binding service platform receives a request message for requesting to verify the identity of the user. The request message includes the user's cell phone number.
Step S302, the mobile phone number binding service platform determines the Internet service corresponding to the mobile phone number according to the request message.
Step S303, the mobile phone number binding service platform searches the mobile phone number and the user security identity SUK corresponding to the Internet service from the first mapping table to obtain a binding SUK. And obtaining the current SUK of the current attribution user according to the mobile phone number. And the binding SUK is the corresponding SUK when the mobile phone number is bound with the Internet service registration.
And S304, the mobile phone number binding service platform compares the binding SUK with the current SUK and sends a comparison result.
By adopting the method for verifying the identity of the internet registered user provided by the embodiment of the disclosure, the mobile phone number and the internet service corresponding to the mobile phone number are determined through the request message, then the binding SUK corresponding to the mobile phone number and the internet service when being registered and bound is obtained from the first mapping table, the current SUK of the current user to which the mobile phone number belongs is obtained, the comparison result of the binding SUK and the current SUK is obtained, and the comparison result is sent. Therefore, whether the current attribution user of the mobile phone number and the user of the mobile phone number binding the Internet service are the same user or not can be determined through the comparison result of the binding SUK and the current SUK, whether the mobile phone number is the secondary number of the Internet service bound by the mobile phone number or not can be verified, the new attribution user of the mobile phone number can hardly log in the user account of the original attribution user in the Internet service by using the mobile phone number, and the probability of information leakage of the original attribution user is reduced.
Optionally, the request message further includes an internet service identifier; the mobile phone number binding service platform determines the internet service corresponding to the mobile phone number according to the request message, and the method comprises the following steps: and the mobile phone number binding service platform analyzes the request message to obtain an Internet service identifier, and determines the Internet service corresponding to the mobile phone number. Therefore, the mobile phone number binding service platform can analyze the Internet service identification through the request message, so that the Internet service corresponding to the mobile phone number can be accurately determined. The method and the device have the advantages that the binding SUK is obtained according to the internet service, the binding SUK is compared with the current SUK, whether the current home subscriber of the mobile phone number and the subscriber of the mobile phone number when the mobile phone number is bound with the internet service are the same subscriber can be determined according to the comparison result, whether the mobile phone number is the secondary number of the internet service bound with the mobile phone number can be verified, a new home subscriber of the mobile phone number can not log in a subscriber account number of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced. The Internet service identification is an Internet service ID and is used for representing the Internet service.
Optionally, the determining, by the mobile phone number binding service platform, the internet service corresponding to the mobile phone number according to the request message includes: and the mobile phone number binding service platform takes the internet service corresponding to the sending address of the request message as the internet service corresponding to the mobile phone number. The request message for requesting to verify the user identity is sent by the internet service platform. The sending address is the IP address of the Internet service platform sending the request message. Therefore, the mobile phone number binding service platform can timely and accurately acquire the internet service corresponding to the mobile phone number, so that the bound SUK can be accurately acquired according to the internet service, the current home subscriber and the original home subscriber are distinguished according to the comparison result of the bound SUK and the current SUK, whether the mobile phone number is the secondary number of the internet service bound by the mobile phone number or not can be verified, the new home subscriber of the mobile phone number is difficult to log in the user account number of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced.
In some embodiments, the mobile number binding service platform receives a request message including a mobile number. The transmission address of the request message is IP 1. And performing table look-up operation on the IP1 by using a preset Internet service address database to obtain the Internet service corresponding to the IP 1. Wherein, the corresponding relation between the sending address and the internet service is stored in the internet service address database. And determining the searched internet service as the internet service corresponding to the mobile phone number. And searching the binding SUK corresponding to the mobile phone number and the Internet service together from the first mapping table. And obtaining the current SUK of the current attributive user according to the mobile phone number. And obtaining a comparison result of the binding SUK and the current SUK.
Optionally, the obtaining, by the mobile phone number binding service platform, the current SUK of the current home subscriber according to the mobile phone number includes: and the mobile phone number binding service platform acquires the current SUK of the current home subscriber from the telecom operator according to the mobile phone number. Therefore, the mobile phone number binding service platform can acquire the current SUK of the current home subscriber of the mobile phone number in real time from the telecom operator without hysteresis.
Further, the step of acquiring the current SUK of the current home subscriber from the telecom operator by the mobile phone number binding service platform according to the mobile phone number includes: and the mobile phone number binding service platform inquires the user safety identity of the current home subscriber corresponding to the mobile phone number from the telecom operator to obtain the current SUK. Or, the mobile phone number binding service platform sends a user identity query request of the mobile phone number to the telecom operator, and triggers the telecom operator to query and feed back a user security identity and a current SUK of the current home subscriber corresponding to the mobile phone number.
Optionally, the obtaining, by the mobile phone number binding service platform, the current SUK of the current home subscriber according to the mobile phone number includes: and the mobile phone number binding service platform searches the mobile phone number from the second mapping table to obtain the current SUK of the current home subscriber. The second mapping table reflects the mapping relation between the mobile phone number and the user security identity. Therefore, the mobile phone number binding service platform can obtain the current SUK of the correct mobile phone number current attribution user in the second mapping table, so that whether the mobile phone number is the secondary number of the internet service bound by the mobile phone number or not can be verified by comparing the current SUK with the binding SUK.
Optionally, the sending of the comparison result by the mobile phone number binding service platform includes: and the mobile phone number binding service platform sends the comparison result of the binding SUK and the current SUK to an internet service platform for providing internet service, so that the internet service platform executes related operation according to the comparison result. The Internet service platform for providing the Internet service is the Internet service platform for sending the request message.
Optionally, the related operations comprise: and refusing the binding of the mobile phone number and other user accounts of the corresponding Internet service initiated by the user, or allowing the user to log in the Internet service bound with the mobile phone number through the mobile phone number and the short message verification code, or executing the binding of the mobile phone number and other user accounts of the Internet service initiated by the user, or refusing the user to log in the Internet service bound with the mobile phone number through the mobile phone number and the short message verification code, or removing the binding relationship between the mobile phone number and the bound Internet service, and the like. The releasing of the binding relationship between the mobile phone number and the bound internet service comprises the following steps: and deleting the binding relationship between the mobile phone number and the bound internet service. Or, the binding relation between the mobile phone number and the internet service bound by the mobile phone number is marked as invalid/recycled.
Therefore, the Internet service platform can verify whether the mobile phone number is the secondary number of the Internet service bound by the mobile phone number according to the comparison result of the bound SUK and the current SUK sent by the mobile phone number binding service platform, so that the Internet service platform executes related operations according to the verification result, a new home subscriber of the mobile phone number is difficult to log in a user account of the original home subscriber in the Internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced. Meanwhile, a new home subscriber of the mobile phone number can log in or bind a user account of the new home subscriber on the Internet service.
In some embodiments, in the case that the comparison result of the binding SUK and the current SUK is the same, the internet service platform determines that the current home subscriber of the mobile phone number is the same subscriber as the subscriber of the mobile phone number when the internet service is bound. The Internet service platform refuses the binding of the mobile phone number and other user accounts of the Internet service initiated by the user, or allows the user to log in the Internet service bound with the mobile phone number through the mobile phone number and the short message verification code.
And under the condition that the comparison result of the binding SUK and the current SUK is different, the Internet service platform determines that the current home subscriber of the mobile phone number is not the same as the subscriber of the mobile phone number when the Internet service is bound. The internet service platform executes the binding relationship between the mobile phone number and the internet service which is bound with the mobile phone number, and allows the user to initiate the binding of the mobile phone number and other user accounts of the internet service. Or, the user is refused to log in the internet service bound with the mobile phone number through the mobile phone number and the short message verification code. Therefore, the Internet service platform can determine whether the current home subscriber of the mobile phone number and the subscriber when the mobile phone number binds the Internet service are the same subscriber according to the comparison result of the received binding SUK and the current SUK, so as to determine whether the new subscriber account in the Internet service is allowed to be bound, or the Internet service is logged in, or the binding relationship between the mobile phone number and the Internet service is released, so that the new home subscriber of the mobile phone number is difficult to log in the subscriber account of the original home subscriber in the Internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced.
Optionally, the method for verifying the identity of an internet registered user further comprises: after receiving a binding notification of binding a mobile phone number with other user accounts of the internet service, the mobile phone number binding service platform stores a mapping relation among the mobile phone number, the corresponding internet service and the current user security identity SUK in a first mapping table.
Optionally, the method for verifying the identity of an internet registered user further includes: after a unbinding notice of the unbound relation between the mobile phone number and the internet service bound by the mobile phone number is received, the mobile phone number binding service platform marks the mapping relation among the mobile phone number, the internet service bound by the mobile phone number and the bound SUK as invalid/recycled in a first mapping table, or deletes the mapping relation among the mobile phone number, the internet service bound by the mobile phone number and the bound SUK from the first mapping table.
Based on the system for verifying the identity of the internet registered user shown in fig. 1, in combination with fig. 4, an embodiment of the present disclosure provides a method for verifying the identity of the internet registered user, where the method includes:
step S401, the mobile phone number binding service platform determines that the current home subscriber of the Internet service bound by the mobile phone number changes.
Step S402, the mobile phone number binding service platform marks the mapping relation between the mobile phone number and the internet service and the user safety identity SUK bound by the mobile phone number as invalid/recycled in a first mapping table, or deletes the mapping relation between the mobile phone number and the internet service and the user safety identity SUK bound by the mobile phone number from the first mapping table; the first mapping table reflects the mapping relation among the mobile phone number, the SUK and the Internet service.
Step S403, the mobile phone number binding service platform sends a notification message to the internet service platform providing internet service, so that the internet service platform knows that the current home subscriber of the internet service bound by the mobile phone number has changed.
By adopting the method for verifying the identity of the internet registered user provided by the embodiment of the disclosure, the current home subscriber of the internet service bound by the mobile phone number is determined to be changed, and the notification message is sent to the internet service platform, so that the internet service platform knows that the current home subscriber of the internet service bound by the mobile phone number is changed. And marking the mapping relation between the mobile phone number and the internet service and the user security identity SUK bound to the mobile phone number as invalid/recycled in the first mapping table, or deleting the mapping relation between the mobile phone number and the internet service and the user security identity SUK bound to the mobile phone number from the first mapping table. Therefore, the current home subscriber of the internet service bound by the mobile phone number can be determined to be changed by determining that the current home subscriber of the internet service bound by the mobile phone number is changed, so that the mobile phone number can be determined to be the secondary number of the internet service bound by the mobile phone number. And actively informing the Internet service platform when the current home subscriber of the Internet service bound by the mobile phone number changes. And the mapping relation between the mobile phone number and the internet service and the user security identity SUK bound by the mobile phone number can be automatically removed. Therefore, a new home subscriber of the mobile phone number is difficult to log in a user account of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced.
Optionally, the determining, by the mobile phone number binding service platform, that the current home subscriber of the internet service to which the mobile phone number is bound changes includes: the mobile phone number binding service platform determines that the current home subscriber of the internet service bound by the mobile phone number changes according to the message sent by the telecom operator. Therefore, the current home subscriber of the internet service bound by the mobile phone number can be determined to change through the message sent by the telecom operator, so that the current home subscriber of the mobile phone number can be determined to change, and the mobile phone number can be determined to be the secondary number of the internet service bound by the mobile phone number.
The mobile phone number is a secondary number of the internet service bound with the mobile phone number, specifically, the mobile phone number bound with the internet service does not belong to the internet service user when bound any more, and the mobile phone number is recycled or placed to another user after being recycled.
The message sent by the telecom operator comprises a recovery message of the mobile phone number or a new number-placing message after the mobile phone number is recovered. The recovery message of the mobile phone number is that the mobile phone number is recovered. And the new number-placing message after the mobile phone number is recovered is the number placed of the mobile phone number.
Further, the mobile phone number binding service platform determines that the current home subscriber of all internet services bound by the mobile phone number changes when receiving a recycle message sent by a telecom operator or a new number-placing message after the mobile phone number is recycled. Therefore, the mobile phone number binding service platform can simultaneously inform all the internet services bound by the mobile phone number, so that the internet service platform receiving the notice can know that the current home subscriber of the mobile phone number is not the same subscriber as the subscriber bound by the internet service, and the mobile phone number can be determined to be the secondary number of the internet service bound by the mobile phone number.
Optionally, the determining, by the mobile phone number binding service platform, that the current home subscriber of the internet service to which the mobile phone number is bound changes includes: and the mobile phone number binding service platform obtains the current SUK of the current attributive user of the mobile phone number. And the mobile phone number binding service platform acquires one or more mapping relations corresponding to the mobile phone number in the first mapping table according to the mobile phone number. And the mobile phone number binding service platform determines that the current home subscriber of the internet service bound by the mobile phone number in the mapping relation changes under the condition that the current SUK is different from the binding SUK corresponding to the mobile phone number in the mapping relation. Therefore, the mobile phone number binding service platform can compare the current SUK with the binding SUK, and under the condition that the current SUK is different from the binding SUK corresponding to the mobile phone number in the mapping relation, the mobile phone number binding service platform informs the Internet service platform corresponding to the Internet service bound by the mobile phone number in the mapping relation, so that the Internet service platform receiving the notice can know that the current home subscriber of the mobile phone number changes, and the mobile phone number is determined to be the secondary number of the Internet service bound by the mobile phone number. The new home subscriber of the mobile phone number is difficult to log in the user account number of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced.
Optionally, the obtaining, by the mobile phone number binding service platform, the current SUK of the current home subscriber of the mobile phone number includes: and the mobile phone number binding service platform acquires the current SUK of the current home subscriber from the telecom operator according to the mobile phone number. Therefore, the mobile phone number binding service platform can acquire the current SUK of the current attributive user of the mobile phone number in real time from the telecom operator, and hysteresis is avoided.
Further, the acquiring, by the mobile phone number binding service platform, the current SUK of the current home subscriber from the telecom operator according to the mobile phone number includes: and the mobile phone number binding service platform inquires the user safety identity of the current home subscriber corresponding to the mobile phone number from the telecom operator to obtain the current SUK. Or, the mobile phone number binding service platform sends a user identity query request of the mobile phone number to the telecom operator, and triggers the telecom operator to query and feed back a user security identity and a current SUK of the current home subscriber corresponding to the mobile phone number.
Optionally, the obtaining, by the mobile phone number binding service platform, the current SUK of the current home subscriber of the mobile phone number includes: and the mobile phone number binding service platform searches the mobile phone number from the second mapping table to obtain the current SUK of the current home subscriber. The second mapping table reflects the mapping relation between the mobile phone number and the user security identity. Therefore, the mobile phone number binding service platform can acquire the correct current SUK of the current mobile phone number attribution user in the second mapping table, so that the current mobile phone number attribution user is determined to be changed under the condition that the current SUK is different from the binding SUK. And the new home subscriber of the mobile phone number is difficult to log in the user account number of the original home subscriber in the internet service by using the mobile phone number, so that the information leakage probability of the original home subscriber is reduced.
Optionally, after sending the notification message to the internet service platform providing the internet service, the method further includes: and enabling the Internet service platform to execute relevant operations according to the notification message. The notification message is a message that the current home subscriber of the internet service bound by the mobile phone number changes.
Optionally, the related operations comprise: and allowing the user to initiate binding of the mobile phone number and other user accounts of the Internet service, or removing the binding relation between the mobile phone number and the bound Internet service. The method for releasing the binding relationship between the mobile phone number and the bound internet service comprises the following steps: and deleting the binding relationship between the mobile phone number and the bound internet service, or marking the binding relationship between the mobile phone number and the bound internet service as failure/recovery.
In some embodiments, upon receiving the notification message, the internet service platform determines that the current home subscriber of the internet service to which the cell phone number is bound has changed. The internet service platform releases the binding relationship between the mobile phone number and the internet service already bound by the mobile phone number, and allows the user to initiate the binding of the mobile phone number and other user accounts of the internet service. Therefore, the Internet service platform can determine the mobile phone number as the secondary number of the Internet service bound by the mobile phone number according to the received notification message. The new home subscriber of the mobile phone number is difficult to log in the user account number of the original home subscriber in the internet service by using the mobile phone number, and the information leakage probability of the original home subscriber is reduced. Meanwhile, the new home subscriber of the mobile phone number can bind the user account of the new home subscriber on the Internet service.
Optionally, the method for verifying the identity of an internet registered user further comprises: after a unbinding notice of the unbound relation between the mobile phone number and the internet service bound by the mobile phone number is received, the mobile phone number binding service platform marks the mapping relation among the mobile phone number, the internet service bound by the mobile phone number and the bound SUK as invalid/recycled in a first mapping table, or deletes the mapping relation among the mobile phone number, the internet service bound by the mobile phone number and the bound SUK from the first mapping table.
Optionally, the method for verifying the identity of an internet registered user further includes: after receiving a binding notification of binding a mobile phone number with other user accounts of the internet service, the mobile phone number binding service platform stores a mapping relation among the mobile phone number, the corresponding internet service and the current user security identity SUK in a first mapping table.
In some embodiments, when the first mobile phone number is tied to an internet service, the home subscriber for the first mobile phone number is user 1. After the user 1 applies to the telecom operator to log out the first mobile phone number, the telecom operator newly issues the first mobile phone number to the user 2. The mobile phone number binding service platform determines that the current home subscriber of the internet service bound by the first mobile phone number changes through a recovery message of the first mobile phone number or a new number allocation message of the first mobile phone number sent by a telecom operator. And sending a notification message to the internet service platform of the internet service bound by the first mobile phone number. The Internet service platform learns that the current home subscriber of the Internet service bound by the first mobile phone number is changed, and marks the binding relationship between the first mobile phone number and the Internet service bound by the first mobile phone number as invalid or deleted.
As shown in fig. 5, an apparatus for verifying the identity of an internet registered user according to an embodiment of the present disclosure includes a processor (processor)500 and a memory (memory) 501. Optionally, the apparatus may also include a Communication Interface 502 and a bus 503. The processor 500, the communication interface 502, and the memory 501 may communicate with each other via a bus 503. Communication interface 502 may be used for information transfer. The processor 500 may invoke logic instructions in the memory 501 to perform the method for verifying the identity of an internet registered user of the above-described embodiments.
In addition, the logic instructions in the memory 501 may be implemented in the form of software functional units and may be stored in a computer readable storage medium when the logic instructions are sold or used as independent products.
The memory 501 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 500 executes functional applications and data processing, i.e. implements the method for verifying the identity of an internet registered user in the above-described embodiments, by executing program instructions/modules stored in the memory 501.
The memory 501 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 501 may include a high-speed random access memory and may also include a nonvolatile memory.
By adopting the device for verifying the identity of the internet registered user provided by the embodiment of the disclosure, the security identity of the second user of the current home user of the mobile phone number to be changed and bound is obtained by obtaining the security identity of the first user corresponding to the binding of the mobile phone number bound with the internet service and the security identity of the second user, and then the security identity of the first user and the security identity of the second user are compared. The identity authentication method and the identity authentication device can determine whether the user identity corresponding to the first user safety identity is the same as the user identity corresponding to the second user safety identity, thereby determining whether the user corresponding to the bound mobile phone number and the home subscriber of the mobile phone number to be changed and bound are the same, and realizing the identity authentication of the home subscriber of the mobile phone number to be changed and bound. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
The embodiment of the disclosure provides a server, which comprises the device for verifying the identity of the internet registered user.
The server adopts the method for verifying the identity of the internet registered user provided by the embodiment of the disclosure, acquires the corresponding first user safety identity when the mobile phone number bound with the internet service is bound with the internet service, acquires the second user safety identity of the current home user of the mobile phone number to be changed and bound, and then compares the first user safety identity with the second user safety identity. The identity authentication method and the identity authentication device can determine whether the user identity corresponding to the first user safety identity is the same as the user identity corresponding to the second user safety identity, thereby determining whether the user corresponding to the bound mobile phone number and the home subscriber of the mobile phone number to be changed and bound are the same, and realizing the identity authentication of the home subscriber of the mobile phone number to be changed and bound. Therefore, a malicious user can hardly change the mobile phone number bound to the Internet service maliciously.
Embodiments of the present disclosure provide a storage medium having stored thereon computer-executable instructions configured to perform the above-described method for verifying an identity of an internet registered user.
Embodiments of the present disclosure provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the above-described method for verifying the identity of an internet registered user.
The computer-readable storage medium described above may be a transitory computer-readable storage medium or a non-transitory computer-readable storage medium.
The technical solution of the embodiments of the present disclosure may be embodied in the form of a software product, where the computer software product is stored in a storage medium and includes one or more instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium comprising: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes, and may also be a transient storage medium.
The above description and drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. Furthermore, the words used in the specification are words of description only and are not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising an …" does not exclude the presence of other like elements in a process, method or apparatus that comprises the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by the skilled person that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be only one type of logical functional division, and there may be other divisions in actual implementation, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than disclosed in the description, and sometimes there is no specific order between the different operations or steps. For example, two sequential operations or steps may in fact be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (11)

1. A method for verifying the identity of an internet registered user, comprising:
receiving a first handset number and a second handset number corresponding to the same internet service;
acquiring a first user security identity SUKa corresponding to the first mobile phone number;
acquiring a second user security identity SUKb corresponding to a second mobile phone number;
comparing the SUKa with the SUKb, and sending a comparison result;
the first mobile phone number is a mobile phone number bound with the internet service, and the SUKa is a user security identity corresponding to the first mobile phone number bound with the internet service; the second mobile phone number is a mobile phone number to be changed and bound, and the SUKb is a user security identity of a current home subscriber of the second mobile phone number.
2. The method according to claim 1, wherein the obtaining of the first user security identity SUKa corresponding to the first mobile phone number comprises:
searching the first mobile phone number and the user security identity corresponding to the internet service from a first mapping table to obtain an SUKa;
the first mapping table reflects the mapping relation among the mobile phone number, the user security identity and the internet service.
3. The method of claim 2, further comprising:
establishing a second mapping table according to the mobile phone number sent by the telecom operator and the user security identity corresponding to the mobile phone number; the second mapping table reflects the mapping relation between the mobile phone number and the user security identity;
receiving a binding notification sent by an Internet service platform;
determining the mobile phone number and the bound Internet service according to the binding notification;
generating the first mapping table based on a second mapping table.
4. The method of claim 2, further comprising:
receiving a binding notification sent by an Internet service platform;
determining the mobile phone number and the bound internet service according to the binding notification;
acquiring a corresponding user safety identity from a telecom operator according to the mobile phone number;
and generating the first mapping table.
5. The method according to claim 1, wherein the obtaining a second user security identity SUKb corresponding to the second mobile phone number comprises:
and acquiring the corresponding SUKb from the telecom operator according to the second mobile phone number.
6. The method according to claim 1, wherein the obtaining a second user security identity SUKb corresponding to the second mobile phone number comprises:
searching the second mobile phone number in a second mapping table to obtain a corresponding SUKb;
and the second mapping table reflects the mapping relation between the mobile phone number and the user security identity.
7. The method of any of claims 1 to 6, wherein the sending the comparison result comprises:
and sending the comparison result of the SUKa and the SUKb to an Internet service platform providing the Internet service so that the Internet service platform executes related operations according to the comparison result.
8. The method of any of claims 1 to 6, further comprising:
determining that the current home subscriber of the internet service bound by the mobile phone number changes;
marking the mapping relation between the mobile phone number and the internet service and the user safety identity SUK bound with the mobile phone number as invalid/recycled in a first mapping table, or deleting the mapping relation between the mobile phone number and the internet service and the user safety identity SUK bound with the mobile phone number from the first mapping table; the first mapping table reflects the mapping relation among the mobile phone number, the SUK and the Internet service;
and sending a notification message to an Internet service platform providing the Internet service, so that the Internet service platform knows that the current home subscriber of the Internet service bound by the mobile phone number has changed.
9. An apparatus for verifying the identity of an internet registered user, comprising a processor and a memory storing program instructions, wherein the processor is configured to perform the method for verifying the identity of a registered user as claimed in any one of claims 1 to 8 when executing the program instructions.
10. A server, characterized in that it comprises means for verifying the identity of an internet registered user according to claim 9.
11. A storage medium storing program instructions which, when executed, perform a method for verifying the identity of an internet registered user as claimed in any one of claims 1 to 8.
CN202210577577.3A 2022-05-25 2022-05-25 Method and device for verifying identity of Internet registered user, server and storage medium Active CN115134118B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210577577.3A CN115134118B (en) 2022-05-25 2022-05-25 Method and device for verifying identity of Internet registered user, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210577577.3A CN115134118B (en) 2022-05-25 2022-05-25 Method and device for verifying identity of Internet registered user, server and storage medium

Publications (2)

Publication Number Publication Date
CN115134118A true CN115134118A (en) 2022-09-30
CN115134118B CN115134118B (en) 2024-03-26

Family

ID=83375846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210577577.3A Active CN115134118B (en) 2022-05-25 2022-05-25 Method and device for verifying identity of Internet registered user, server and storage medium

Country Status (1)

Country Link
CN (1) CN115134118B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554037A (en) * 2016-02-24 2016-05-04 中国联合网络通信集团有限公司 Identity identification processing method and service platform
CN108737366A (en) * 2017-04-17 2018-11-02 王正伟 Binding method
WO2020215568A1 (en) * 2019-04-23 2020-10-29 平安科技(深圳)有限公司 Communication number changing method, apparatus and system, computer device and storage medium
CN112672357A (en) * 2020-12-25 2021-04-16 平安科技(深圳)有限公司 Method and device for processing user account in business system and computer equipment
CN114268462A (en) * 2021-11-26 2022-04-01 中国联合网络通信集团有限公司 Asset information changing method, server, client and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554037A (en) * 2016-02-24 2016-05-04 中国联合网络通信集团有限公司 Identity identification processing method and service platform
CN108737366A (en) * 2017-04-17 2018-11-02 王正伟 Binding method
WO2020215568A1 (en) * 2019-04-23 2020-10-29 平安科技(深圳)有限公司 Communication number changing method, apparatus and system, computer device and storage medium
CN112672357A (en) * 2020-12-25 2021-04-16 平安科技(深圳)有限公司 Method and device for processing user account in business system and computer equipment
CN114268462A (en) * 2021-11-26 2022-04-01 中国联合网络通信集团有限公司 Asset information changing method, server, client and storage medium

Also Published As

Publication number Publication date
CN115134118B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
CN100556052C (en) Telephone number change notification method and telephone number change notification system
CN108881354B (en) Push information storage method and device, server and computer storage medium
CN112235798B (en) Method, terminal and newly added network element for redirecting to AMF in idle state
CN110324815B (en) One-number-multi-card opening method, server, terminal and block chain network system
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
EP2611226A1 (en) Processing method and system for over-the-air bootstrap
CN104702760A (en) Communication number updating method and device
CN102082589A (en) Method, device and system for storing contact information
WO2018010480A1 (en) Network locking method for esim card, terminal, and network locking authentication server
CN107172194B (en) Virtual SIM card management method and device and communication terminal
CN110337100B (en) Block chain-based method, terminal and system for adding one-number multi-card service auxiliary card
CN113079258A (en) Number privacy protection method, network device and computer storage medium
CN101594615B (en) Method, system and equipment for network management of terminal triple information security
CN107113320B (en) Method, related equipment and system for downloading signed file
CN114239072A (en) Block chain node management method and block chain network
CN110267219B (en) Call forwarding reporting method, register, user terminal and block chain network
CN115134118B (en) Method and device for verifying identity of Internet registered user, server and storage medium
CN115134119B (en) Method and device for verifying identity of Internet registered user, server and storage medium
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
CN115134116B (en) Method and device for verifying identity of Internet registered user, server and storage medium
CN115134117B (en) Method and device for verifying identity of Internet registered user, server and storage medium
CN101778055B (en) Message processing method and network entity
CN104753774A (en) Distributed enterprise integrated access gateway
CN111163466B (en) Method for 5G user terminal to access block chain, user terminal equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant