CN115499232A - Real-name authentication method, device, server and storage medium - Google Patents

Real-name authentication method, device, server and storage medium Download PDF

Info

Publication number
CN115499232A
CN115499232A CN202211176796.7A CN202211176796A CN115499232A CN 115499232 A CN115499232 A CN 115499232A CN 202211176796 A CN202211176796 A CN 202211176796A CN 115499232 A CN115499232 A CN 115499232A
Authority
CN
China
Prior art keywords
authentication
information
real
user
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211176796.7A
Other languages
Chinese (zh)
Inventor
蔡佳佳
唐泽坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Changan Automobile Co Ltd
Original Assignee
Chongqing Changan Automobile Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Changan Automobile Co Ltd filed Critical Chongqing Changan Automobile Co Ltd
Priority to CN202211176796.7A priority Critical patent/CN115499232A/en
Publication of CN115499232A publication Critical patent/CN115499232A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • G06Q30/015Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
    • G06Q30/016After-sales
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Biomedical Technology (AREA)
  • Power Engineering (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to the technical field of vehicle networking, in particular to a real-name authentication method, a real-name authentication device, a real-name authentication server and a storage medium, wherein the method comprises the following steps: detecting whether the real-name authentication of the user meets a preset abnormal condition; when detecting that real-name authentication of a user meets a preset abnormal condition, acquiring a current authentication channel of the user, and acquiring buried point data for the real-name authentication of the user from a target server based on the current authentication channel; and analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to the target personnel so as to finish the real-name authentication of the user after the target personnel processes the at least one abnormal link and the abnormal reason. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.

Description

Real-name authentication method, device, server and storage medium
Technical Field
The application relates to the technical field of vehicle networking, in particular to a real-name authentication method, a real-name authentication device, a real-name authentication server and a storage medium.
Background
Along with the continuous development of the car networking technology, the intelligent experience of the car is continuously improved, and various networking software functions on the car machine are gradually increased. Networking real-name authentication of vehicles, networking activation becomes the pre-base for these experiences. When a vehicle is purchased, a vehicle owner can firstly carry out networking activation on the vehicle with real-name authentication, some abnormity may occur in the process, if abnormal reasons cannot be quickly positioned and solved in time, the real-name authentication efficiency of a user is very influenced, and further the subsequent automobile software service experience of the user is influenced.
In the related art, although the user fails to feed back the authentication and the abnormal reason is checked, a real-time monitoring technology is lacked, and the related abnormality cannot be actively discovered and timely solved.
Disclosure of Invention
The application provides a real-name authentication method, a real-name authentication device, a server and a storage medium, solves the problems that a real-time monitoring authentication technology is lacked in the related technology, relevant abnormity is actively discovered and solved, and the like, improves real-name authentication efficiency, and improves after-sale automobile software service experience of a user.
An embodiment of a first aspect of the present application provides a real-name authentication method, including the following steps: detecting whether real-name authentication of a user meets a preset abnormal condition; when detecting that the real-name authentication of the user meets a preset abnormal condition, acquiring a current authentication channel of the user, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person, so that after the target person processes the at least one abnormal link and the abnormal reason, real-name authentication of the user is completed.
According to the technical means, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Further, before acquiring buried point data for real-name authentication of the user from the target server based on the current authentication channel, the method further includes: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, first embedded point information is generated, otherwise, whether the vehicle information of the user meets a second preset authentication condition is judged; if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information; and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
According to the technical means, the data of the embedded points are generated according to different information of the embedded points and uploaded to the server, and when the authentication is abnormal, the abnormality can be located in time.
Further, the real-name authentication method includes: the first embedded point information comprises authentication link information and an authentication failure reason of the identity information; the second embedded point information comprises authentication link information and authentication failure reasons of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
According to the technical means, the abnormal positioning of the target person can be accurately realized through different embedded point information generated in different links, and the problem is solved conveniently.
Further, before determining whether the vehicle information of the user meets the second preset authentication condition, the method further includes: acquiring a first duration after the identity information of the user meets the first preset authentication condition; and if the duration is longer than a first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
According to the technical means, the user and the target person can check the time-out information in time.
Further, before determining whether the operator information satisfies the third preset authentication condition, the method further includes: acquiring a second duration after the vehicle information of the user meets the second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
According to the technical means, users and target personnel can check the time-out information in time by generating the time-out information.
Further, the real-name authentication method further includes: and sending the first timeout information and/or the second timeout information to the target person.
According to the technical means, the overtime information is sent to the target personnel, so that the target personnel can timely acquire and solve the abnormity, and the authentication efficiency is improved.
An embodiment of a second aspect of the present application provides a real-name authentication apparatus, including: the detection module is used for detecting whether the real-name authentication of the user meets a preset abnormal condition; the acquisition module is used for acquiring a current authentication channel of the user when detecting that the real-name authentication of the user meets a preset abnormal condition, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; and the authentication module is used for analyzing the data of the buried points, obtaining at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person so as to finish real-name authentication of the user after the target person processes the at least one abnormal link and the abnormal reason.
Further, before acquiring buried point data for the user to perform real-name authentication from the target server based on the current authentication channel, the acquiring module is specifically configured to: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, first embedded point information is generated, otherwise, whether the vehicle information of the user meets a second preset authentication condition is judged; if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information; and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
Further, the real-name authentication apparatus described above further includes: the first embedded point information comprises authentication link information and authentication failure reasons of the identity information; the second embedded point information comprises authentication link information and an authentication failure reason of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
Further, before determining whether the vehicle information of the user meets the second preset authentication condition, the obtaining module is further configured to: acquiring a first duration after the identity information of the user meets the first preset authentication condition; and if the duration is longer than a first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
Further, before determining whether the operator information satisfies the third preset authentication condition, the obtaining module is further configured to: acquiring a second duration after the vehicle information of the user meets the second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
Further, the real-name authentication apparatus described above further includes: and the sending module is used for sending the first timeout information and/or the second timeout information to the target person.
An embodiment of a third aspect of the present application provides a server, including: one or more processors; the storage device stores one or more programs to implement the real-name authentication method according to the embodiment.
A fourth aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the real-name authentication method according to the foregoing embodiments.
Therefore, whether real-name authentication of a user meets preset abnormal conditions or not is detected, when the fact that the real-name authentication of the user meets the preset abnormal conditions is detected, a current authentication channel of the user is obtained, data of embedded points of the user for real-name authentication are obtained from a target server based on the current authentication channel, the data of the embedded points are analyzed, abnormal reasons corresponding to at least one abnormal link and each abnormal link are obtained, the at least one abnormal link and the abnormal reasons corresponding to each abnormal link are sent to a target person, and the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reasons. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart of a real-name authentication method according to an embodiment of the present application;
fig. 2 is a flow chart of data upload of a real-name authentication service system according to an embodiment of the present application;
FIG. 3 is a flow diagram of a real-name authentication monitoring system according to one embodiment of the present application;
FIG. 4 is a flow diagram of a real-name authentication method according to one embodiment of the present application;
FIG. 5 is a block diagram of a real-name authentication device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application.
Description of reference numerals: 10-real name authentication device, 100-detection module, 200-acquisition module, 300-authentication module, 60-processor, 61-storage device, 62-communication device.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
A real-name authentication method, apparatus, server, and storage medium according to embodiments of the present application are described below with reference to the accompanying drawings. Aiming at the problems that the related technologies mentioned in the background technology lack a real-time monitoring authentication technology and the related abnormity is actively discovered and solved, the application provides a real-name authentication method, wherein in the method, whether the real-name authentication of a user meets a preset abnormal condition is detected; when the fact that real-name authentication of a user meets a preset abnormal condition is detected, a current authentication channel of the user is obtained, and buried point data for the real-name authentication of the user is obtained from a target server based on the current authentication channel; and analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to the target personnel so as to finish the real-name authentication of the user after the target personnel processes the at least one abnormal link and the abnormal reason. Therefore, the problem that a real-time monitoring authentication technology is lacked in the related technology is solved, the problem of related abnormity is actively discovered and solved, the real-name authentication efficiency is improved, and the after-sale automobile software service experience of a user is improved.
Specifically, fig. 1 is a schematic flowchart of a real-name authentication method according to an embodiment of the present disclosure.
As shown in fig. 1, the real-name authentication method includes the steps of:
in step S101, it is detected whether the real-name authentication of the user satisfies a preset abnormal condition.
It should be understood that, after the user selects the shop end or the APP end, the user will fill in basic personal identity information, where the identity information includes identity card information, bank card information, fingerprint information, and the like, and upload a file such as a car purchase invoice, and the real-name authentication service system will determine whether real-name authentication of the user is abnormal according to the file such as the identity information uploaded by the user and the car purchase invoice.
In step S102, when it is detected that the real-name authentication of the user satisfies the preset abnormal condition, a current authentication channel of the user is obtained, and based on the current authentication channel, buried point data for the real-name authentication of the user is obtained from the target server.
In an understandable process, if the identity information uploaded by the user and the file information such as the vehicle purchase invoice are wrong, the real-name authentication service system acquires an authentication channel of the user.
Further, in some embodiments, before obtaining the buried point data for real-name authentication of the user from the target server based on the current authentication channel, the method further includes: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, generating first embedded point information, otherwise, judging whether the vehicle information of the user meets a second preset authentication condition or not; if the vehicle information of the user does not meet the second preset authentication condition, second embedded point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet a third preset authentication condition, generating third buried point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth buried point information; and obtaining buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
Optionally, in some embodiments, the real-name authentication method includes: the first embedded point information comprises authentication link information of identity information and an authentication failure reason; the second embedded point information comprises authentication link information and authentication failure reasons of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
Specifically, as shown in fig. 2, if the identity information uploaded by the user and the file information such as the vehicle purchase invoice are wrong, and the real-name authentication service system determines that the identity information does not satisfy the first preset authentication condition, first buried point information is generated, that is, the authentication link information and the authentication failure reason of the identity information; if the identity information of the user does not have errors, the first preset authentication condition is met, the vehicle information authentication link is entered after the information is successfully verified, whether the vehicle information of the user meets the second preset authentication condition is judged, the real-name authentication service system acquires and verifies the vehicle information of the user, wherein the vehicle information comprises vehicle frame numbers, vehicle authentication, vehicle configuration, vehicle invoices and the like, and if the real-name authentication service system fails to verify, the vehicle information of the user does not meet the second preset authentication condition, second embedded point information is generated, namely the authentication link information of the vehicle information and the authentication failure reason; if the vehicle information is successfully checked, entering an operator information authentication link, wherein the operator information comprises an operator name and the like, and if the operator information is failed to be checked, indicating that the operator information does not meet a third preset authentication condition, generating third buried point information, namely authentication link information and an authentication failure reason of the operator information; and if the operator information is successfully checked, the user completes the real-name authentication to generate fourth embedded point information, namely link information of the user completing the real-name authentication.
Further, the real-name authentication service system records authentication link information and authentication failure reasons of a real-name authentication link and link information of a user completing real-name authentication, or records the authentication link information and the authentication failure reasons or the link information of the user completing the real-name authentication, generates buried point data in a unified manner, and uploads the buried point data to the target server.
Optionally, in some embodiments, before determining whether the vehicle information of the user meets the second preset authentication condition, the method further includes: acquiring a first duration after the identity information of the user meets a first preset authentication condition; and if the duration is longer than the first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system. The first preset duration and the second preset duration may be thresholds preset by a user, may be thresholds obtained through limited experiments, or may be thresholds obtained through limited computer simulation, and are not specifically limited herein.
Specifically, as shown in fig. 3, the real-name authentication monitoring system obtains buried point data of the real-name authentication service system from the target server, and monitors the whole process from the start of authentication to the final result of the user in real time, thereby ensuring a closed loop of each user authentication process. The user selects a channel from the beginning of authentication, after information is filled in, the real-name authentication system monitors the state of the user beginning authentication through operation records, if the information verification fails, the monitoring system reads specific failure reasons and displays the failure reasons in the monitoring system in real time. If the audit is successful, the monitoring system records that the information audit is successful, and enters a business audit link, and the overtime time can be set according to specific business requirements.
If the real-name authentication monitoring system obtains a first duration after the identity information of the user meets a first preset authentication condition, if the duration is longer than the first preset duration, the service audit is overtime, first overtime information is generated, and the user can check the real-name authentication overtime information through a display screen. And if the user successfully enters the vehicle information auditing link, the auditing process is successful.
Optionally, in some embodiments, before determining whether the operator information satisfies the third preset authentication condition, the method further includes: acquiring a second duration after the vehicle information of the user meets a second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
Specifically, the real-name authentication monitoring system acquires a second duration after the vehicle information of the user meets a second preset authentication condition, if the second duration is longer than the second preset duration, which indicates that the service auditing link is overtime, second overtime information is generated, and the user can check the overtime information through a display screen. And if the user successfully enters the operator information authentication link, the verification process is successful.
Further, in some embodiments, the real-name authentication method further includes: and sending the first timeout information and/or the second timeout information to the target person.
It should be understood that, if an overtime condition occurs in the business auditing link, the real-name authentication monitoring system acquires the first overtime information and the second overtime information, or the first overtime information or the second overtime information, and sends the first overtime information or the second overtime information to the target person.
In step S103, the data of the embedded points is analyzed to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and the at least one abnormal link and the abnormal reason corresponding to each abnormal link are sent to the target person, so that the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reason.
It should be understood by those skilled in the art that, if a certain flow of the service auditing link is abnormal, the real-name authentication monitoring system reads an abnormal reason corresponding to the abnormal link, displays the abnormal reason in the system in real time, and sends the abnormal reason to the target person, and the target person obtains the abnormal reason corresponding to the abnormal link, and solves the problem in time to complete real-name authentication of the user in time.
In summary, as shown in fig. 4, a user performs real-name authentication through different channels, and then enters a real-name authentication system at a shop end or an APP end to perform real-name authentication, the real-name authentication system records operations of the user, records embedded points of the operation results and uploads the embedded points to a server, the real-name authentication monitoring system accesses the embedded point data of the real-name authentication of the user from the server in real time, and then monitors the data of each link in real time to analyze abnormal links and reasons causing the abnormal real-name authentication and push the abnormal links to target persons of related links, so as to perform targeted troubleshooting and solve the abnormalities, thereby completing the real-name authentication normally.
According to the real-name authentication method provided by the embodiment of the application, whether real-name authentication of a user meets preset abnormal conditions is detected, when the fact that the real-name authentication of the user meets the preset abnormal conditions is detected, a current authentication channel of the user is obtained, data of embedded points of the user for the real-name authentication are obtained from a target server based on the current authentication channel, the data of the embedded points are analyzed, at least one abnormal link and abnormal reasons corresponding to each abnormal link are obtained, the at least one abnormal link and the abnormal reasons corresponding to each abnormal link are sent to a target person, and the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reasons. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Next, a real-name authentication apparatus proposed according to an embodiment of the present application is described with reference to the drawings.
Fig. 5 is a block diagram illustrating a real-name authentication device according to an embodiment of the present application.
As shown in fig. 5, the real-name authentication apparatus 10 includes: detection module 100, acquisition module 200, and authentication module 300.
The detection module 100 is configured to detect whether real-name authentication of a user meets a preset abnormal condition; the acquiring module 200 is configured to acquire a current authentication channel of the user when it is detected that the real-name authentication of the user meets a preset abnormal condition, and acquire buried point data for the real-name authentication of the user from the target server based on the current authentication channel; the authentication module 300 is configured to analyze the data of the buried point, obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and send the at least one abnormal link and the abnormal reason corresponding to each abnormal link to the target person, so that after the target person processes the at least one abnormal link and the abnormal reason, real-name authentication of the user is completed.
Optionally, in some embodiments, before acquiring buried point data for real-name authentication performed by a user from a target server based on a current authentication channel, the acquiring module 200 is specifically configured to: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, generating first embedded point information, otherwise, judging whether the vehicle information of the user meets a second preset authentication condition or not; if the vehicle information of the user does not meet the second preset authentication condition, second embedded point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet a third preset authentication condition, generating third buried point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth buried point information; and obtaining buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
Optionally, in some embodiments, the real-name authentication apparatus further includes: the first embedded point information comprises authentication link information of identity information and an authentication failure reason; the second embedded point information comprises authentication link information and authentication failure reasons of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
Optionally, in some embodiments, before determining whether the vehicle information of the user meets the second preset authentication condition, the obtaining module 200 is further configured to: acquiring a first duration after the identity information of the user meets a first preset authentication condition; and if the duration is longer than the first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
Optionally, in some embodiments, before determining whether the operator information satisfies the third preset authentication condition, the obtaining module 200 is further configured to: acquiring a second duration after the vehicle information of the user meets a second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
Optionally, in some embodiments, the real-name authentication apparatus further includes: and the sending module is used for sending the first timeout information and/or the second timeout information to the target personnel.
It should be noted that the explanation of the embodiment of the real-name authentication method described above is also applicable to the real-name authentication apparatus of this embodiment, and details are not described here.
According to the real-name authentication device provided by the embodiment of the application, whether real-name authentication of a user meets preset abnormal conditions is detected, when the fact that the real-name authentication of the user meets the preset abnormal conditions is detected, a current authentication channel of the user is obtained, data of embedded points of the user for the real-name authentication are obtained from a target server based on the current authentication channel, the data of the embedded points are analyzed, at least one abnormal link and abnormal reasons corresponding to each abnormal link are obtained, the at least one abnormal link and the abnormal reasons corresponding to each abnormal link are sent to a target person, and the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reasons. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application. The server may include:
a processor 60, storage means 61 and communication means 62; the number of the processors 60 in the server may be one or more, and one processor 860 is taken as an example in fig. 6; the processor 60, the storage device 61 and the communication device 62 in the server may be connected by a bus or other means, and the bus connection is taken as an example in fig. 6.
Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, where the program, when executed by a processor, implements the real-name authentication method as above.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "N" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of implementing the embodiments of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a programmable gate array, a field programmable gate array, or the like.
It will be understood by those skilled in the art that all or part of the steps carried out in the method of implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and the program, when executed, includes one or a combination of the steps of the method embodiments.
While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are exemplary and should not be construed as limiting the present application and that changes, modifications, substitutions and alterations in the above embodiments may be made by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A real-name authentication method is characterized by comprising the following steps:
detecting whether real-name authentication of a user meets a preset abnormal condition;
when detecting that the real-name authentication of the user meets a preset abnormal condition, acquiring a current authentication channel of the user, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; and
analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person, so that after the target person processes the at least one abnormal link and the abnormal reason, real-name authentication of the user is completed.
2. The method of claim 1, further comprising, before obtaining the buried point data for real-name authentication of the user from the target server based on the current authentication channel:
judging whether the identity information of the user meets a first preset authentication condition or not;
if the identity information does not meet the first preset authentication condition, first embedded point information is generated, and if not, whether the vehicle information of the user meets a second preset authentication condition is judged;
if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged;
if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information;
and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
3. The method of claim 2, comprising:
the first embedded point information comprises authentication link information and authentication failure reasons of the identity information;
the second embedded point information comprises authentication link information and an authentication failure reason of the vehicle information;
the third embedded point information comprises authentication link information and authentication failure reasons of the operator information;
the third embedded point information comprises link information of the user completing real-name authentication.
4. The method according to claim 2, before determining whether the vehicle information of the user satisfies the second preset authentication condition, further comprising:
acquiring a first duration after the identity information of the user meets the first preset authentication condition;
and if the duration is longer than a first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
5. The method according to claim 4, before determining whether the operator information satisfies the third preset authentication condition, further comprising:
acquiring a second duration after the vehicle information of the user meets the second preset authentication condition;
and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
6. The method of claim 5, further comprising:
and sending the first timeout information and/or the second timeout information to the target person.
7. A real-name authentication apparatus, comprising:
the detection module is used for detecting whether the real-name authentication of the user meets a preset abnormal condition;
the acquisition module is used for acquiring a current authentication channel of the user when detecting that the real-name authentication of the user meets a preset abnormal condition, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; and
and the authentication module is used for analyzing the data of the buried points, obtaining at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person so as to finish real-name authentication of the user after the target person processes the at least one abnormal link and the abnormal reason.
8. The apparatus as claimed in claim 7, wherein before the obtaining of the buried point data for the real-name authentication of the user from the target server based on the current authentication channel, the obtaining module is specifically configured to:
judging whether the identity information of the user meets a first preset authentication condition or not;
if the identity information does not meet the first preset authentication condition, first embedded point information is generated, otherwise, whether the vehicle information of the user meets a second preset authentication condition is judged;
if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged;
if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information;
and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
9. A server, characterized in that the server comprises:
one or more processors;
a storage device to store one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the real-name authentication method of any one of claims 1-6.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the real-name authentication method according to any one of claims 1 to 6.
CN202211176796.7A 2022-09-26 2022-09-26 Real-name authentication method, device, server and storage medium Pending CN115499232A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211176796.7A CN115499232A (en) 2022-09-26 2022-09-26 Real-name authentication method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211176796.7A CN115499232A (en) 2022-09-26 2022-09-26 Real-name authentication method, device, server and storage medium

Publications (1)

Publication Number Publication Date
CN115499232A true CN115499232A (en) 2022-12-20

Family

ID=84472224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211176796.7A Pending CN115499232A (en) 2022-09-26 2022-09-26 Real-name authentication method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN115499232A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116015959B (en) * 2023-01-03 2024-06-11 重庆长安汽车股份有限公司 Real name authentication method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491611A (en) * 2020-11-25 2021-03-12 网银在线(北京)科技有限公司 Fault location system, method, apparatus, electronic device and computer readable medium
CN113094238A (en) * 2021-04-25 2021-07-09 深圳前海微众银行股份有限公司 Method and device for monitoring abnormity of business system
CN114257451A (en) * 2021-12-22 2022-03-29 广州品唯软件有限公司 Verification interface replacing method and device, storage medium and computer equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491611A (en) * 2020-11-25 2021-03-12 网银在线(北京)科技有限公司 Fault location system, method, apparatus, electronic device and computer readable medium
CN113094238A (en) * 2021-04-25 2021-07-09 深圳前海微众银行股份有限公司 Method and device for monitoring abnormity of business system
CN114257451A (en) * 2021-12-22 2022-03-29 广州品唯软件有限公司 Verification interface replacing method and device, storage medium and computer equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116015959B (en) * 2023-01-03 2024-06-11 重庆长安汽车股份有限公司 Real name authentication method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104572320B (en) Method for confirming correction program and information processing equipment
US8676432B2 (en) Fault prediction framework using temporal data mining
WO2018232936A1 (en) Fault repair method and apparatus for shared device
CN109733238B (en) Fault detection method, device, storage medium and processor
CN102439568A (en) System health and performance care of computing devices
CN114327543A (en) Online upgrading method and device for vehicle-mounted controller, vehicle and storage medium
CN111752850B (en) Method and related equipment for testing block chain system
CN109739536A (en) The method, apparatus and storage medium of vehicle remote firmware updating
CN113377403A (en) Vehicle remote software upgrading method and device
CN112134961B (en) Client use control method, client and computer storage medium
CN112363920A (en) Test case repairing method and device, computer equipment and storage medium
CN111311044A (en) Vehicle damage assessment method and system
CN113918123A (en) Product optimization management system and method
CN115499232A (en) Real-name authentication method, device, server and storage medium
CN116257270A (en) Vehicle, upgrading method and device of vehicle
CN111258820A (en) OBU (on-board unit) equipment activation method, terminal equipment and server
CN112242917A (en) Internet of vehicles service quality detection method and system
CN115220989B (en) Payment software monitoring method, device and system
CN115118577A (en) Method and device for determining remote upgrade abnormal reason, electronic equipment and storage medium
CN117261924A (en) Vehicle control method, device, equipment and storage medium
CN115185252A (en) Remote diagnosis method and device based on automobile fault lamp
CN114356769A (en) Software learning method, device, equipment and storage medium
JP2019144752A (en) Verification terminal
WO2015172488A1 (en) Method and apparatus for detecting network access faults of wireless communication device, and wireless communication device
CN115050117B (en) Vehicle diagnosis report generation method and device and diagnosis equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination