CN115208581A - Application information processing method and device, electronic equipment and storage medium - Google Patents

Application information processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115208581A
CN115208581A CN202210825077.7A CN202210825077A CN115208581A CN 115208581 A CN115208581 A CN 115208581A CN 202210825077 A CN202210825077 A CN 202210825077A CN 115208581 A CN115208581 A CN 115208581A
Authority
CN
China
Prior art keywords
equipment
user
target
new
old
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210825077.7A
Other languages
Chinese (zh)
Inventor
黄文强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202210825077.7A priority Critical patent/CN115208581A/en
Publication of CN115208581A publication Critical patent/CN115208581A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Abstract

The application discloses an application information processing method and device, electronic equipment and a storage medium, which can be applied to the field of artificial intelligence or finance, wherein the method comprises the following steps: when a target user logs in a target application through new equipment for the first time, acquiring a user number input by the target user; finding out the equipment number bound by the current user number from a database; receiving the equipment number of the old equipment sent after the current target user successfully logs in the target application on the old equipment by using the user number; judging whether the equipment number bound by the user number is consistent with the equipment number of the old equipment; if the identity is consistent with the identity of the old equipment, sending a user identity authentication request to the old equipment; acquiring authentication information input by a target user and acquired by old equipment, and verifying the authentication information input by the target user; if the verification information input by the target user passes the verification, generating verification passing information; and sending the verification passing information to the new equipment to trigger the new equipment to successfully log in the target application by using the verification passing information.

Description

Application information processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of network security technologies, and in particular, to an application information processing method and apparatus, an electronic device, and a storage medium.
Background
Most current application software relates to the privacy security problem of users, and in the case of mobile banking and other software supporting online payment by binding bank accounts with users, the application software also relates to the fund security problem of users. The security of current application software is also increasingly important.
In order to ensure the security of the user privacy and fund, for many current applications, when a user logs in application software on a new device for the first time, a more complicated authentication process is usually required compared with the authentication that only requires simple identity or password for non-first login. For example, password authentication, cell phone authentication, identification number authentication, face recognition, bound account number authentication, or bound mailbox authentication, etc. are required.
Therefore, although the current authentication mode of first login effectively avoids others from logging in the user number of the user, the whole process is too complicated. Moreover, when the mobile phone number bound to the user number or other bound information is not used any more, the user cannot log in by using the new device directly. The existing approach severely impacts the user experience of switching new devices to use the application.
Disclosure of Invention
Based on the above deficiencies of the prior art, the present application provides an application information processing method and apparatus, an electronic device, and a storage medium, so as to solve the problems of the prior art.
In order to achieve the above object, the present application provides the following technical solutions:
in a first aspect of the present application, a method for processing application information is provided, including:
when a target user logs in a target application through new equipment for the first time, acquiring a user number input by the target user;
finding out the equipment number bound with the current user number from a database;
receiving the equipment number of the old equipment sent after the target user successfully logs in the target application on the old equipment by using the user number;
judging whether the searched equipment number bound to the current user number is consistent with the equipment number of the old equipment;
if the found equipment number bound by the current user number is judged to be consistent with the equipment number of the old equipment, sending a user identity authentication request to the old equipment;
acquiring authentication information input by the target user and acquired by the old equipment, and verifying the authentication information input by the target user;
if the verification information input by the target user passes the verification, generating verification passing information;
and sending the verification passing information to the new equipment to trigger the new equipment to successfully log in the target application by using the verification passing information.
Optionally, in the application information processing method, the method further includes:
after the user number successfully logs in the target application on the new device, if a data migration request sent by the new device is received, acquiring historical target data of the target application on the old device;
comparing each historical target data with target data corresponding to the target application on the new device to obtain difference data;
migrating the difference data to the new device.
Optionally, in the application information processing method, the method further includes:
when the target application is installed on the target new device and the acquisition of the device number is authorized, acquiring the device number of the new device;
determining the equipment manufacturer of the new equipment according to the equipment number of the new equipment;
judging whether the new equipment belongs to newly sold equipment or not based on the product information of the equipment manufacturer to which the new equipment belongs and the current time; if the new device is judged to belong to newly sold devices, the user number input by the target user is obtained when the target user logs in the target application through the new device for the first time;
if the new device is judged not to belong to newly sold devices, sending a complete first login verification request to the new device when a target user logs in the target application through the new device for the first time;
verifying all items of first login verification information input by the target user and acquired by the new equipment;
and if the first login verification information input by the target user passes the verification, authorizing the user number to log in the target application on the new device.
Optionally, in the application information processing method, the method further includes:
after the user number successfully logs in the target application on the new equipment, monitoring the accumulated time of the user number logging in the target application on the new equipment in real time;
if the accumulated time of the user number for logging in the target application on the new equipment is longer than the preset time, acquiring the equipment number of the new equipment;
and releasing the binding relationship between the user number and the old equipment, and establishing the binding relationship between the user number and the equipment number of the new equipment.
A second aspect of the present application provides an application information processing apparatus including:
the first acquisition unit is used for acquiring a user number input by a target user when the target user logs in a target application through new equipment for the first time;
the searching unit is used for searching the device number bound by the current user number from a database;
a receiving unit, configured to receive a device number of an old device sent after a current target user successfully logs in the target application on the old device using the user number;
a first judging unit, configured to judge whether the searched device number bound to the current user number is consistent with the device number of the old device;
a first sending unit, configured to send a user identity authentication request to the old device if it is determined that the device number bound to the searched current user number is consistent with the device number of the old device;
the first verification unit is used for acquiring the identity verification information input by the target user and collected by the old equipment and verifying the identity verification information input by the target user;
a generation unit configured to generate verification-passed information when the verification information input by the target user passes verification;
and the second sending unit is used for sending the verification passing information to the new equipment so as to trigger the new equipment to successfully log in the target application by utilizing the verification passing information.
Optionally, in the application information processing apparatus described above, further comprising:
a second obtaining unit, configured to, after the user number successfully logs in the target application on the new device, obtain, if a data migration request sent by the new device is received, each piece of historical target data of the target application on the old device;
the comparison unit is used for comparing each historical target data with target data corresponding to the target application on the new equipment to obtain difference data;
and the migration unit is used for migrating the difference data to the new equipment.
Optionally, in the application information processing apparatus, the apparatus further comprises:
a third obtaining unit, configured to install the target application on the target new device, and obtain a device number of the new device when obtaining the device number is authorized;
the manufacturer determining unit is used for determining the equipment manufacturer of the new equipment according to the equipment number of the new equipment;
the second judgment unit is used for judging whether the new equipment belongs to newly sold equipment or not based on the product information of the equipment manufacturer to which the new equipment belongs and the current time; if the new device is judged to belong to a new sold device, the first obtaining unit executes the obtaining of the user number input by the target user when the target user logs in the target application through the new device for the first time;
a third sending unit, configured to send a complete first login verification request to the new device when the target user logs in the target application through the new device for the first time after determining that the new device does not belong to a newly sold device;
the second verification unit is used for verifying all items of first login verification information input by the target user and collected by the new equipment;
and the authorization unit is used for authorizing the user number to log in the target application on the new device when all items of first login authentication information input by the target user pass the authentication.
Optionally, in the application information processing apparatus described above, further comprising:
the monitoring unit is used for monitoring the accumulated time length of the user number for logging in the target application on the new device in real time after the user number successfully logs in the target application on the new device;
the device number acquisition unit is used for acquiring the device number of the new device when the accumulated time for the user number to log in the target application on the new device is longer than the preset time;
and the updating unit is used for releasing the binding relationship between the user number and the old equipment and establishing the binding relationship between the user number and the equipment number of the new equipment.
A third aspect of the present application provides an electronic device comprising:
a memory and a processor;
wherein the memory is used for storing programs;
the processor is configured to execute the program, and when the program is executed, the program is specifically configured to implement the application information processing method according to any one of the above items.
A fourth aspect of the present application provides a computer storage medium storing a computer program for implementing an application information processing method as described in any one of the above when the computer program is executed.
The application provides an application information processing method, which is used for acquiring a user number input by a target user when the target user logs in a target application through new equipment for the first time, and finding out an equipment number bound with the current user number from a database. And then receiving the equipment number of the old equipment sent after the current target user successfully logs in the target application on the old equipment by using the user number. And judging whether the found device number bound with the current user number is consistent with the device number of the old device. If the new device and the old device are operated by the target user, the user identity authentication request is sent to the old device if the device number bound by the found current user number is judged to be consistent with the device number of the old device. And acquiring the identity authentication information input by the target user and acquired by the old equipment, and authenticating the identity authentication information input by the target user so as to simply authenticate the target user. And if the verification information input by the target user passes the verification, generating verification passing information. And finally, sending the verification passing information to the new equipment to trigger the new equipment to successfully log in the target application by using the verification passing information. Therefore, by means of simultaneous operation of the user on the new device and the old device, not only is the safety guaranteed, but also the verification steps can be properly reduced, the verification complexity is reduced, and the use experience of the user on the new device is effectively improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only the embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for applying an information processing method according to an embodiment of the present application;
fig. 2 is a flowchart of a security verification method according to an embodiment of the present application;
fig. 3 is a flowchart of a method for updating a binding relationship of a user number according to an embodiment of the present application;
fig. 4 is a flowchart of a data migration method for an old device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an application information processing apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In this application, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
An embodiment of the present application provides an application information processing method, as shown in fig. 1, including the following steps:
s101, when a target user logs in a target application through new equipment for the first time, acquiring a user number input by the target user.
Wherein the target user may refer to any one of the users. The target application refers to a designated application, such as cell phone banking.
Specifically, when the target user inputs a user number and a password on the new device and clicks login, the user number and the password input by the target user are acquired at the moment. At this time, it is first necessary to determine whether the user number is the first time to log in the target application on the new device. And if the user number is the user number which is firstly logged in the target application in the new equipment, extracting the user number input by the target user for executing the subsequent steps. If the user number is not the first time to log in the target application in the new device, the verification is normally carried out.
Optionally, in order to make the login manner more flexible, the condition that the old device of the target user is not used any more is also considered, so when the target user logs in the target application for the first time in the new device, the user can select to adopt the existing more complicated and complete first login verification manner, or select the simpler and more convenient manner provided by the embodiment of the present application. If the simpler mode provided by the embodiment of the application is selected, the subsequent steps are executed.
In order to effectively ensure the security, in another embodiment of the present application, before the step S101 is executed, a security check is further executed. As shown in fig. 2, a security verification method provided in an embodiment of the present application includes:
s201, when the target application is installed on the target new device and the acquisition of the device number is authorized, acquiring the device number of the new device.
It should be noted that, when the target application is installed and opened, the communication requires the user to authorize multiple rights required for using the functions of the target application. In the embodiment of the application, a right for acquiring the device number is added. Under the condition of authorization of the target user, the device number of the new device can be read and sent to the background system.
S202, determining the equipment manufacturer of the new equipment according to the equipment number of the new equipment.
S203, judging whether the new equipment belongs to newly sold equipment or not based on the product information of the equipment manufacturer to which the new equipment belongs and the current time.
Alternatively, the time difference between the current time and the selling time of the new device may be calculated, and it may be determined whether the time difference is within a preset time range. And if the current time is within the preset time range, determining that the new equipment belongs to newly sold equipment.
Since a software pirate rarely purchases a new device only for pirating software, when the new device is judged to belong to a newly sold device, the step S101 is executed to acquire the user number input by the target user when the target user logs in the target application through the new device for the first time, so that certain risk can be reduced.
If the new device is determined not to belong to the newly sold device, step S204 is executed when the target user logs in the target application through the new device for the first time.
And S204, sending a complete first login verification request to the new equipment.
And S205, verifying all items of first login verification information input by the target user and collected by the new equipment.
S206, judging whether all the first login authentication information input by the target user passes the authentication.
If the first login authentication information input by the target user passes the authentication, step S207 is executed.
And S207, the authorized user number logs in the target application on the new device.
S102, finding out the equipment number bound with the current user number from the database.
It should be noted that, in this embodiment of the application, when the target user normally uses the target application in the original device, the user number logged in by the target user and the device number of the original device used are bound, and the obtained binding relationship is stored in the database. The device number to which the current user number is bound can be looked up from the database.
S103, receiving the equipment number of the old equipment sent after the current target user successfully logs in the target application on the old equipment by using the user number.
Specifically, after the user performs the login operation on the new device, the user number needs to be logged in on the old device that was used originally. As for the original old equipment, the user logs in the target application by using the user, the successful login of the target application can be realized only by carrying out normal simple verification. Or the target user may have been online on the old device before. So it can be the case that the target application successor system on the old device sends the device number of the old device at this time. Accordingly, the backend system will receive the device number of the old device.
S104, judging whether the found device number bound with the current user number is consistent with the device number of the old device.
It should be noted that, for others, information such as the user number and the password of the target user is stolen through a network attack, but the other people cannot own the old device of the target user. The target application cannot be successfully logged in through a simple verification mode. Therefore, the new device and the old device can be effectively ensured to be operated by the target user through comparing whether the found device number bound with the current user number is consistent with the device number of the old device.
Therefore, if the device number bound by the found current user number is judged to be consistent with the device number of the old device, the subsequent steps can be continuously executed.
And S105, sending a user identity authentication request to the old equipment.
It should be noted that, in order to ensure security, the user still needs to perform relatively simple authentication. That is, the authentication in the embodiment of the present application is relatively simple, by including only password authentication and authentication of the identification number. However, the user identity authentication request is used for authenticating the identity of the user, and information such as a password can also authenticate the target user, and is not limited to authentication of personal identity information.
S106, acquiring the authentication information input by the target user and acquired by the old equipment, and authenticating the authentication information input by the target user.
Specifically, after sending the user authentication information to the old device, the old device will correspondingly require the target user to input corresponding authentication information, and after the user inputs the corresponding authentication information, the old device sends the corresponding authentication information to the background system for authentication.
And S107, if the verification information input by the target user passes the verification, generating verification passing information.
After the verification information input by the target user is verified, it is stated that the target user operates himself, so that the verification-passed information is generated at this time, and specifically, the verification-passed information may include authorization information and the like.
And S108, sending the verification passing information to the new equipment to trigger the new equipment to successfully log in the target application by using the verification passing information.
Specifically, after receiving the verification passing information, the new device indicates that the login authorization is obtained, so that the target application can be logged in by using the verification passing information.
Optionally, in another embodiment of the present application, after step S108 is executed, updating of the binding relationship of the user number is further executed. As shown in fig. 3, an updating method for a binding relationship of a user number provided in an embodiment of the present application includes:
s301, after the user number successfully logs in the target application on the new device, monitoring the accumulated time of the user number logging in the target application on the new device in real time.
It should be noted that, after the target user uses the new device, the device number bound to the user number should be updated to the device number of the new device, so that the target user can log in by using the method provided in the embodiment of the present application when changing the device later. However, considering that the user may only use the new device temporarily for logging in, the accumulated time for logging in the target application on the new device is required to meet the requirement.
S302, judging whether the accumulated time of the user number for logging in the target application on the new device is longer than the preset time.
Alternatively, the determination may be performed in real time, or may be performed at intervals. If the accumulated time of the user number logging in the target application on the new device is judged to be greater than the preset time, step S303 is executed, and monitoring may be stopped.
And if the accumulated time of the user number for logging in the target application on the new equipment is judged to be not more than the preset time, continuing monitoring.
S303, acquiring the equipment number of the new equipment.
S304, removing the binding relationship between the user number and the old equipment, and establishing the binding relationship between the user number and the equipment number of the new equipment.
Optionally, in another embodiment of the present application, after step S108 is executed, data migration of the old device may be further performed, that is, partial data of the old device is migrated to the new device, so that the user does not need to perform setting again. As shown in fig. 4, a data migration method for an old device provided in an embodiment of the present application includes:
s401, after the user number successfully logs in the target application on the new device, if a data migration request sent by the new device is received, acquiring each historical target data of the target application on the old device.
It should be noted that, in the process of using the target application on the old device, the target user may continuously perform the setting according to the habit and the requirement of the user, so that the data set by the target user may be retained on the new device, and the user does not need to perform the setting again, so in this embodiment of the application, after the user successfully logs in the target application on the new device, the user may select to perform the data migration, and at this time, step S401 will be performed.
Since not all data can be migrated, it is necessary for a developer to determine in advance what data can be migrated and set it as target data.
The acquired historical target data may include data to be migrated and a corresponding data field, and the data and the corresponding data field are packaged and sent to the background system.
S402, comparing each historical target data with target data corresponding to a target application on the new device to obtain difference data.
Since the present application also has the objective application of the new device in consideration of the possibility of partial data, only the data of the difference needs to be migrated to the new device, so that the difference data needs to be determined and then step S403 needs to be performed.
And S403, migrating the difference data to new equipment.
Optionally, considering that the target applications on the old device and the new device may not be in the same version, at this time, the data mapping and migration may be implemented by using the rule of correspondence between the two versions, so that the function of transferring the history data of the original target application to the new target application may be implemented.
The embodiment of the application information processing method provides that when a target user logs in a target application through new equipment for the first time, a user number input by the target user is obtained, and an equipment number bound with the current user number is searched from a database. And then, receiving the equipment number of the old equipment sent after the current target user successfully logs in the target application on the old equipment by using the user number. And judging whether the found device number bound with the current user number is consistent with the device number of the old device. If the new device and the old device are operated by the target user, the user identity authentication request is sent to the old device if the device number bound by the found current user number is judged to be consistent with the device number of the old device. And acquiring the identity authentication information input by the target user and acquired by the old equipment, and authenticating the identity authentication information input by the target user so as to simply authenticate the target user. And if the verification information input by the target user passes the verification, generating verification passing information. And finally, sending the verification passing information to the new equipment to trigger the new equipment to successfully log in the target application by using the verification passing information. Therefore, by means of simultaneous operation of the user on the new device and the old device, not only is the safety guaranteed, but also the verification steps can be properly reduced, the verification complexity is reduced, and the use experience of the user on the new device is effectively improved.
Another embodiment of the present application provides an application information processing apparatus, as shown in fig. 5, including the following units:
a first obtaining unit 501, configured to obtain a user number input by a target user when the target user logs in a target application through a new device for the first time.
The searching unit 502 is configured to search the database for the device number bound to the current user number.
A receiving unit 503, configured to receive the device number of the old device sent after the current target user successfully logs in the target application on the old device using the user number.
A first judging unit 504, configured to judge whether the device number bound to the found current user number is consistent with the device number of the old device.
A first sending unit 505, configured to send a user authentication request to the old device if it is determined that the device number bound to the searched current user number is consistent with the device number of the old device.
The first verification unit 506 is configured to obtain the authentication information input by the target user and collected by the old device, and verify the authentication information input by the target user.
A generating unit 507, configured to generate verification-passed information when the verification information input by the target user passes verification.
A second sending unit 508, configured to send the verification passing information to the new device, so as to trigger the new device to successfully log in the target application by using the verification passing information.
Optionally, in an application information processing apparatus provided in another embodiment of the present application, the application information processing apparatus further includes:
and the second obtaining unit is used for obtaining each historical target data of the target application on the old equipment if receiving the data migration request sent by the new equipment after the user number successfully logs in the target application on the new equipment.
And the comparison unit is used for comparing each historical target data with the target data corresponding to the target application on the new equipment to obtain difference data.
And the migration unit is used for migrating the difference data to the new equipment.
Optionally, in an application information processing apparatus provided in another embodiment of the present application, further including:
and the third acquisition unit is used for installing the target application on the target new device and acquiring the device number of the new device when the acquisition of the device number is authorized.
And the manufacturer determining unit is used for determining the equipment manufacturer of the new equipment according to the equipment number of the new equipment.
And the second judging unit is used for judging whether the new equipment belongs to newly sold equipment or not based on the product information of the equipment manufacturer to which the new equipment belongs and the current time. If the new device is judged to belong to the newly sold device, the first obtaining unit obtains the user number input by the target user when the target user logs in the target application through the new device for the first time.
And the third sending unit is used for sending a complete first login verification request to the new equipment when the target user logs in the target application through the new equipment for the first time after judging that the new equipment does not belong to the newly sold equipment.
And the second verification unit is used for verifying the first login verification information which is acquired by the new equipment and input by the target user.
And the authorization unit is used for authorizing the user number to log in the target application on the new device when all items of first login authentication information input by the target user pass the authentication.
Optionally, in an application information processing apparatus provided in another embodiment of the present application, the application information processing apparatus further includes:
and the monitoring unit is used for monitoring the accumulated time length of the user number for logging in the target application on the new equipment in real time after the user number successfully logs in the target application on the new equipment.
And the equipment number acquisition unit is used for acquiring the equipment number of the new equipment when the accumulated time for the user number to log in the target application on the new equipment is longer than the preset time.
And the updating unit is used for releasing the binding relationship between the user number and the old equipment and establishing the binding relationship between the user number and the equipment number of the new equipment.
It should be noted that, for the specific working processes of each unit provided in the foregoing embodiments of the present application, corresponding steps in the foregoing method embodiments may be referred to accordingly, and are not described herein again.
Another embodiment of the present application provides an electronic device, as shown in fig. 6, including:
a memory 601 and a processor 602.
The memory 601 is used for storing programs.
The processor 602 is configured to execute the program stored in the memory 601, and when the program is executed, the program is specifically configured to implement the application information processing method provided in any of the above-mentioned embodiments.
Another embodiment of the present application provides a computer storage medium for storing a computer program, which when executed, is used to implement the application information processing method provided in any one of the above embodiments.
Computer storage media, including permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should be noted that the application information processing method and apparatus, the electronic device, and the storage medium provided by the present invention can be used in the field of artificial intelligence or the financial field. The foregoing is merely an example, and does not limit the application fields of the application information processing method and apparatus, the electronic device, and the storage medium provided by the present invention.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the components and steps of the various examples have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An application information processing method, comprising:
when a target user logs in a target application through new equipment for the first time, acquiring a user number input by the target user;
finding out the equipment number bound with the current user number from a database;
receiving the equipment number of the old equipment sent after the target user successfully logs in the target application on the old equipment by using the user number;
judging whether the searched equipment number bound with the current user number is consistent with the equipment number of the old equipment;
if the found equipment number bound with the current user number is judged to be consistent with the equipment number of the old equipment, sending a user identity authentication request to the old equipment;
acquiring authentication information input by the target user and acquired by the old equipment, and verifying the authentication information input by the target user;
if the verification information input by the target user passes verification, generating verification passing information;
and sending the verification passing information to the new equipment to trigger the new equipment to successfully log in the target application by using the verification passing information.
2. The method of claim 1, further comprising:
after the user number successfully logs in the target application on the new device, if a data migration request sent by the new device is received, acquiring historical target data of the target application on the old device;
comparing each historical target data with target data corresponding to the target application on the new device to obtain difference data;
migrating the difference data to the new device.
3. The method of claim 1, further comprising:
when the target application is installed on the target new device and the acquisition of the device number is authorized, acquiring the device number of the new device;
determining the equipment manufacturer of the new equipment according to the equipment number of the new equipment;
judging whether the new equipment belongs to newly sold equipment or not based on the product information of the equipment manufacturer to which the new equipment belongs and the current time; if the new device is judged to belong to newly sold devices, the user number input by the target user is obtained when the target user logs in the target application through the new device for the first time;
if the new device is judged not to belong to newly sold devices, sending a complete first login verification request to the new device when a target user logs in the target application through the new device for the first time;
verifying all items of first login verification information input by the target user and acquired by the new equipment;
and if the first login authentication information input by the target user passes the authentication, authorizing the user number to login the target application on the new device.
4. The method of claim 1, further comprising:
after the user number successfully logs in the target application on the new equipment, monitoring the accumulated time of the user number logging in the target application on the new equipment in real time;
if the accumulated time of the user number for logging in the target application on the new equipment is longer than the preset time, acquiring the equipment number of the new equipment;
and releasing the binding relationship between the user number and the old equipment, and establishing the binding relationship between the user number and the equipment number of the new equipment.
5. An application information processing apparatus characterized by comprising:
the first acquisition unit is used for acquiring a user number input by a target user when the target user logs in a target application through new equipment for the first time;
the searching unit is used for searching the equipment number bound by the current user number from a database;
a receiving unit, configured to receive a device number of an old device sent after a current target user successfully logs in the target application on the old device using the user number;
a first judging unit, configured to judge whether the searched device number bound to the current user number is consistent with the device number of the old device;
a first sending unit, configured to send a user authentication request to the old device if it is determined that the device number bound to the searched user number is consistent with the device number of the old device;
the first verification unit is used for acquiring the identity verification information input by the target user and collected by the old equipment and verifying the identity verification information input by the target user;
a generation unit configured to generate verification-passed information when the verification information input by the target user passes verification;
and the second sending unit is used for sending the verification passing information to the new equipment so as to trigger the new equipment to successfully log in the target application by using the verification passing information.
6. The apparatus of claim 5, further comprising:
a second obtaining unit, configured to, after the user number successfully logs in the target application on the new device, obtain, if a data migration request sent by the new device is received, each piece of historical target data of the target application on the old device;
the comparison unit is used for comparing each historical target data with target data corresponding to the target application on the new equipment to obtain difference data;
and the migration unit is used for migrating the difference data to the new equipment.
7. The apparatus of claim 5, further comprising:
a third obtaining unit, configured to install the target application on the target new device, and obtain a device number of the new device when obtaining the device number is authorized;
the manufacturer determining unit is used for determining the equipment manufacturer of the new equipment according to the equipment number of the new equipment;
the second judgment unit is used for judging whether the new equipment belongs to newly sold equipment or not based on the product information of the equipment manufacturer to which the new equipment belongs and the current time; if the new device is judged to belong to a new sold device, the first obtaining unit executes the obtaining of the user number input by the target user when the target user logs in the target application through the new device for the first time;
the third sending unit is used for sending a complete first login verification request to the new device when the target user logs in the target application through the new device for the first time after judging that the new device does not belong to newly sold devices;
the second verification unit is used for verifying all items of first login verification information input by the target user and collected by the new equipment;
and the authorization unit is used for authorizing the user number to log in the target application on the new device when all items of first login authentication information input by the target user pass the authentication.
8. The apparatus of claim 5, further comprising:
the monitoring unit is used for monitoring the accumulated time length of the user number for logging in the target application on the new device in real time after the user number successfully logs in the target application on the new device;
the device number acquisition unit is used for acquiring the device number of the new device when the accumulated time for the user number to log in the target application on the new device is longer than the preset time;
and the updating unit is used for releasing the binding relationship between the user number and the old equipment and establishing the binding relationship between the user number and the equipment number of the new equipment.
9. An electronic device, comprising:
a memory and a processor;
wherein the memory is used for storing programs;
the processor is configured to execute the program, and when the program is executed, the program is specifically configured to implement the application information processing method according to any one of claims 1 to 4.
10. A computer storage medium storing a computer program for implementing the application information processing method according to any one of claims 1 to 4 when executed.
CN202210825077.7A 2022-07-14 2022-07-14 Application information processing method and device, electronic equipment and storage medium Pending CN115208581A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210825077.7A CN115208581A (en) 2022-07-14 2022-07-14 Application information processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210825077.7A CN115208581A (en) 2022-07-14 2022-07-14 Application information processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115208581A true CN115208581A (en) 2022-10-18

Family

ID=83579295

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210825077.7A Pending CN115208581A (en) 2022-07-14 2022-07-14 Application information processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115208581A (en)

Similar Documents

Publication Publication Date Title
EP3490215B1 (en) Method and device for controlling service operation risk
EP3413255A1 (en) Electronic payment service processing method and device, and electronic payment method and device
US8818906B1 (en) Systems and methods for performing authentication of a customer interacting with a banking platform
CN107169499B (en) Risk identification method and device
US20160125522A1 (en) Automatic account lockout
US11379591B2 (en) Methods and devices for user authorization
CN110874743B (en) Method and device for determining account transaction risk
JP2018063695A (en) System and method for performing secure online banking transactions
CN110738473A (en) Wind control method, system, device and equipment
CN107046516B (en) Wind control method and device for identifying mobile terminal identity
CN112016929A (en) Online payment method and device, electronic equipment and computer storage medium
US11411947B2 (en) Systems and methods for smart contract-based detection of authentication attacks
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
CN109639437B (en) Monitoring method, device, equipment and medium based on trusted data source
CN115695005A (en) Account login verification method and device, electronic equipment and storage medium
CN107040497B (en) Network account anti-theft method and device
CN111212019B (en) User account access control method, device and equipment
CN114117539A (en) Data protection method and device
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN112016930A (en) Detection method of transaction security, related device and computer storage medium
CN115208581A (en) Application information processing method and device, electronic equipment and storage medium
CN115150137A (en) High-frequency access early warning method and device based on Redis
CN114298714A (en) Account identity authentication method and device, electronic equipment and storage medium
US9172719B2 (en) Intermediate trust state
CN104134025A (en) Mobile terminal locking method and device based on SIM cards and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination