CN115499232A - Real-name authentication method, device, server and storage medium - Google Patents
Real-name authentication method, device, server and storage medium Download PDFInfo
- Publication number
- CN115499232A CN115499232A CN202211176796.7A CN202211176796A CN115499232A CN 115499232 A CN115499232 A CN 115499232A CN 202211176796 A CN202211176796 A CN 202211176796A CN 115499232 A CN115499232 A CN 115499232A
- Authority
- CN
- China
- Prior art keywords
- authentication
- information
- real
- user
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 61
- 230000002159 abnormal effect Effects 0.000 claims abstract description 125
- 230000008569 process Effects 0.000 claims abstract description 19
- 238000001514 detection method Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 19
- 238000012544 monitoring process Methods 0.000 abstract description 19
- 230000006855 networking Effects 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012550 audit Methods 0.000 description 4
- 230000005856 abnormality Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000004913 activation Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000005094 computer simulation Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
- G06Q30/015—Providing customer assistance, e.g. assisting a customer within a business location or via helpdesk
- G06Q30/016—After-sales
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Biomedical Technology (AREA)
- Power Engineering (AREA)
- Medical Informatics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to the technical field of vehicle networking, in particular to a real-name authentication method, a real-name authentication device, a real-name authentication server and a storage medium, wherein the method comprises the following steps: detecting whether the real-name authentication of the user meets a preset abnormal condition; when detecting that real-name authentication of a user meets a preset abnormal condition, acquiring a current authentication channel of the user, and acquiring buried point data for the real-name authentication of the user from a target server based on the current authentication channel; and analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to the target personnel so as to finish the real-name authentication of the user after the target personnel processes the at least one abnormal link and the abnormal reason. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Description
Technical Field
The application relates to the technical field of vehicle networking, in particular to a real-name authentication method, a real-name authentication device, a real-name authentication server and a storage medium.
Background
Along with the continuous development of the car networking technology, the intelligent experience of the car is continuously improved, and various networking software functions on the car machine are gradually increased. Networking real-name authentication of vehicles, networking activation becomes the pre-base for these experiences. When a vehicle is purchased, a vehicle owner can firstly carry out networking activation on the vehicle with real-name authentication, some abnormity may occur in the process, if abnormal reasons cannot be quickly positioned and solved in time, the real-name authentication efficiency of a user is very influenced, and further the subsequent automobile software service experience of the user is influenced.
In the related art, although the user fails to feed back the authentication and the abnormal reason is checked, a real-time monitoring technology is lacked, and the related abnormality cannot be actively discovered and timely solved.
Disclosure of Invention
The application provides a real-name authentication method, a real-name authentication device, a server and a storage medium, solves the problems that a real-time monitoring authentication technology is lacked in the related technology, relevant abnormity is actively discovered and solved, and the like, improves real-name authentication efficiency, and improves after-sale automobile software service experience of a user.
An embodiment of a first aspect of the present application provides a real-name authentication method, including the following steps: detecting whether real-name authentication of a user meets a preset abnormal condition; when detecting that the real-name authentication of the user meets a preset abnormal condition, acquiring a current authentication channel of the user, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person, so that after the target person processes the at least one abnormal link and the abnormal reason, real-name authentication of the user is completed.
According to the technical means, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Further, before acquiring buried point data for real-name authentication of the user from the target server based on the current authentication channel, the method further includes: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, first embedded point information is generated, otherwise, whether the vehicle information of the user meets a second preset authentication condition is judged; if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information; and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
According to the technical means, the data of the embedded points are generated according to different information of the embedded points and uploaded to the server, and when the authentication is abnormal, the abnormality can be located in time.
Further, the real-name authentication method includes: the first embedded point information comprises authentication link information and an authentication failure reason of the identity information; the second embedded point information comprises authentication link information and authentication failure reasons of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
According to the technical means, the abnormal positioning of the target person can be accurately realized through different embedded point information generated in different links, and the problem is solved conveniently.
Further, before determining whether the vehicle information of the user meets the second preset authentication condition, the method further includes: acquiring a first duration after the identity information of the user meets the first preset authentication condition; and if the duration is longer than a first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
According to the technical means, the user and the target person can check the time-out information in time.
Further, before determining whether the operator information satisfies the third preset authentication condition, the method further includes: acquiring a second duration after the vehicle information of the user meets the second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
According to the technical means, users and target personnel can check the time-out information in time by generating the time-out information.
Further, the real-name authentication method further includes: and sending the first timeout information and/or the second timeout information to the target person.
According to the technical means, the overtime information is sent to the target personnel, so that the target personnel can timely acquire and solve the abnormity, and the authentication efficiency is improved.
An embodiment of a second aspect of the present application provides a real-name authentication apparatus, including: the detection module is used for detecting whether the real-name authentication of the user meets a preset abnormal condition; the acquisition module is used for acquiring a current authentication channel of the user when detecting that the real-name authentication of the user meets a preset abnormal condition, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; and the authentication module is used for analyzing the data of the buried points, obtaining at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person so as to finish real-name authentication of the user after the target person processes the at least one abnormal link and the abnormal reason.
Further, before acquiring buried point data for the user to perform real-name authentication from the target server based on the current authentication channel, the acquiring module is specifically configured to: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, first embedded point information is generated, otherwise, whether the vehicle information of the user meets a second preset authentication condition is judged; if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information; and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
Further, the real-name authentication apparatus described above further includes: the first embedded point information comprises authentication link information and authentication failure reasons of the identity information; the second embedded point information comprises authentication link information and an authentication failure reason of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
Further, before determining whether the vehicle information of the user meets the second preset authentication condition, the obtaining module is further configured to: acquiring a first duration after the identity information of the user meets the first preset authentication condition; and if the duration is longer than a first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
Further, before determining whether the operator information satisfies the third preset authentication condition, the obtaining module is further configured to: acquiring a second duration after the vehicle information of the user meets the second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
Further, the real-name authentication apparatus described above further includes: and the sending module is used for sending the first timeout information and/or the second timeout information to the target person.
An embodiment of a third aspect of the present application provides a server, including: one or more processors; the storage device stores one or more programs to implement the real-name authentication method according to the embodiment.
A fourth aspect of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the real-name authentication method according to the foregoing embodiments.
Therefore, whether real-name authentication of a user meets preset abnormal conditions or not is detected, when the fact that the real-name authentication of the user meets the preset abnormal conditions is detected, a current authentication channel of the user is obtained, data of embedded points of the user for real-name authentication are obtained from a target server based on the current authentication channel, the data of the embedded points are analyzed, abnormal reasons corresponding to at least one abnormal link and each abnormal link are obtained, the at least one abnormal link and the abnormal reasons corresponding to each abnormal link are sent to a target person, and the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reasons. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart of a real-name authentication method according to an embodiment of the present application;
fig. 2 is a flow chart of data upload of a real-name authentication service system according to an embodiment of the present application;
FIG. 3 is a flow diagram of a real-name authentication monitoring system according to one embodiment of the present application;
FIG. 4 is a flow diagram of a real-name authentication method according to one embodiment of the present application;
FIG. 5 is a block diagram of a real-name authentication device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application.
Description of reference numerals: 10-real name authentication device, 100-detection module, 200-acquisition module, 300-authentication module, 60-processor, 61-storage device, 62-communication device.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
A real-name authentication method, apparatus, server, and storage medium according to embodiments of the present application are described below with reference to the accompanying drawings. Aiming at the problems that the related technologies mentioned in the background technology lack a real-time monitoring authentication technology and the related abnormity is actively discovered and solved, the application provides a real-name authentication method, wherein in the method, whether the real-name authentication of a user meets a preset abnormal condition is detected; when the fact that real-name authentication of a user meets a preset abnormal condition is detected, a current authentication channel of the user is obtained, and buried point data for the real-name authentication of the user is obtained from a target server based on the current authentication channel; and analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to the target personnel so as to finish the real-name authentication of the user after the target personnel processes the at least one abnormal link and the abnormal reason. Therefore, the problem that a real-time monitoring authentication technology is lacked in the related technology is solved, the problem of related abnormity is actively discovered and solved, the real-name authentication efficiency is improved, and the after-sale automobile software service experience of a user is improved.
Specifically, fig. 1 is a schematic flowchart of a real-name authentication method according to an embodiment of the present disclosure.
As shown in fig. 1, the real-name authentication method includes the steps of:
in step S101, it is detected whether the real-name authentication of the user satisfies a preset abnormal condition.
It should be understood that, after the user selects the shop end or the APP end, the user will fill in basic personal identity information, where the identity information includes identity card information, bank card information, fingerprint information, and the like, and upload a file such as a car purchase invoice, and the real-name authentication service system will determine whether real-name authentication of the user is abnormal according to the file such as the identity information uploaded by the user and the car purchase invoice.
In step S102, when it is detected that the real-name authentication of the user satisfies the preset abnormal condition, a current authentication channel of the user is obtained, and based on the current authentication channel, buried point data for the real-name authentication of the user is obtained from the target server.
In an understandable process, if the identity information uploaded by the user and the file information such as the vehicle purchase invoice are wrong, the real-name authentication service system acquires an authentication channel of the user.
Further, in some embodiments, before obtaining the buried point data for real-name authentication of the user from the target server based on the current authentication channel, the method further includes: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, generating first embedded point information, otherwise, judging whether the vehicle information of the user meets a second preset authentication condition or not; if the vehicle information of the user does not meet the second preset authentication condition, second embedded point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet a third preset authentication condition, generating third buried point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth buried point information; and obtaining buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
Optionally, in some embodiments, the real-name authentication method includes: the first embedded point information comprises authentication link information of identity information and an authentication failure reason; the second embedded point information comprises authentication link information and authentication failure reasons of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
Specifically, as shown in fig. 2, if the identity information uploaded by the user and the file information such as the vehicle purchase invoice are wrong, and the real-name authentication service system determines that the identity information does not satisfy the first preset authentication condition, first buried point information is generated, that is, the authentication link information and the authentication failure reason of the identity information; if the identity information of the user does not have errors, the first preset authentication condition is met, the vehicle information authentication link is entered after the information is successfully verified, whether the vehicle information of the user meets the second preset authentication condition is judged, the real-name authentication service system acquires and verifies the vehicle information of the user, wherein the vehicle information comprises vehicle frame numbers, vehicle authentication, vehicle configuration, vehicle invoices and the like, and if the real-name authentication service system fails to verify, the vehicle information of the user does not meet the second preset authentication condition, second embedded point information is generated, namely the authentication link information of the vehicle information and the authentication failure reason; if the vehicle information is successfully checked, entering an operator information authentication link, wherein the operator information comprises an operator name and the like, and if the operator information is failed to be checked, indicating that the operator information does not meet a third preset authentication condition, generating third buried point information, namely authentication link information and an authentication failure reason of the operator information; and if the operator information is successfully checked, the user completes the real-name authentication to generate fourth embedded point information, namely link information of the user completing the real-name authentication.
Further, the real-name authentication service system records authentication link information and authentication failure reasons of a real-name authentication link and link information of a user completing real-name authentication, or records the authentication link information and the authentication failure reasons or the link information of the user completing the real-name authentication, generates buried point data in a unified manner, and uploads the buried point data to the target server.
Optionally, in some embodiments, before determining whether the vehicle information of the user meets the second preset authentication condition, the method further includes: acquiring a first duration after the identity information of the user meets a first preset authentication condition; and if the duration is longer than the first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system. The first preset duration and the second preset duration may be thresholds preset by a user, may be thresholds obtained through limited experiments, or may be thresholds obtained through limited computer simulation, and are not specifically limited herein.
Specifically, as shown in fig. 3, the real-name authentication monitoring system obtains buried point data of the real-name authentication service system from the target server, and monitors the whole process from the start of authentication to the final result of the user in real time, thereby ensuring a closed loop of each user authentication process. The user selects a channel from the beginning of authentication, after information is filled in, the real-name authentication system monitors the state of the user beginning authentication through operation records, if the information verification fails, the monitoring system reads specific failure reasons and displays the failure reasons in the monitoring system in real time. If the audit is successful, the monitoring system records that the information audit is successful, and enters a business audit link, and the overtime time can be set according to specific business requirements.
If the real-name authentication monitoring system obtains a first duration after the identity information of the user meets a first preset authentication condition, if the duration is longer than the first preset duration, the service audit is overtime, first overtime information is generated, and the user can check the real-name authentication overtime information through a display screen. And if the user successfully enters the vehicle information auditing link, the auditing process is successful.
Optionally, in some embodiments, before determining whether the operator information satisfies the third preset authentication condition, the method further includes: acquiring a second duration after the vehicle information of the user meets a second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
Specifically, the real-name authentication monitoring system acquires a second duration after the vehicle information of the user meets a second preset authentication condition, if the second duration is longer than the second preset duration, which indicates that the service auditing link is overtime, second overtime information is generated, and the user can check the overtime information through a display screen. And if the user successfully enters the operator information authentication link, the verification process is successful.
Further, in some embodiments, the real-name authentication method further includes: and sending the first timeout information and/or the second timeout information to the target person.
It should be understood that, if an overtime condition occurs in the business auditing link, the real-name authentication monitoring system acquires the first overtime information and the second overtime information, or the first overtime information or the second overtime information, and sends the first overtime information or the second overtime information to the target person.
In step S103, the data of the embedded points is analyzed to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and the at least one abnormal link and the abnormal reason corresponding to each abnormal link are sent to the target person, so that the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reason.
It should be understood by those skilled in the art that, if a certain flow of the service auditing link is abnormal, the real-name authentication monitoring system reads an abnormal reason corresponding to the abnormal link, displays the abnormal reason in the system in real time, and sends the abnormal reason to the target person, and the target person obtains the abnormal reason corresponding to the abnormal link, and solves the problem in time to complete real-name authentication of the user in time.
In summary, as shown in fig. 4, a user performs real-name authentication through different channels, and then enters a real-name authentication system at a shop end or an APP end to perform real-name authentication, the real-name authentication system records operations of the user, records embedded points of the operation results and uploads the embedded points to a server, the real-name authentication monitoring system accesses the embedded point data of the real-name authentication of the user from the server in real time, and then monitors the data of each link in real time to analyze abnormal links and reasons causing the abnormal real-name authentication and push the abnormal links to target persons of related links, so as to perform targeted troubleshooting and solve the abnormalities, thereby completing the real-name authentication normally.
According to the real-name authentication method provided by the embodiment of the application, whether real-name authentication of a user meets preset abnormal conditions is detected, when the fact that the real-name authentication of the user meets the preset abnormal conditions is detected, a current authentication channel of the user is obtained, data of embedded points of the user for the real-name authentication are obtained from a target server based on the current authentication channel, the data of the embedded points are analyzed, at least one abnormal link and abnormal reasons corresponding to each abnormal link are obtained, the at least one abnormal link and the abnormal reasons corresponding to each abnormal link are sent to a target person, and the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reasons. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Next, a real-name authentication apparatus proposed according to an embodiment of the present application is described with reference to the drawings.
Fig. 5 is a block diagram illustrating a real-name authentication device according to an embodiment of the present application.
As shown in fig. 5, the real-name authentication apparatus 10 includes: detection module 100, acquisition module 200, and authentication module 300.
The detection module 100 is configured to detect whether real-name authentication of a user meets a preset abnormal condition; the acquiring module 200 is configured to acquire a current authentication channel of the user when it is detected that the real-name authentication of the user meets a preset abnormal condition, and acquire buried point data for the real-name authentication of the user from the target server based on the current authentication channel; the authentication module 300 is configured to analyze the data of the buried point, obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and send the at least one abnormal link and the abnormal reason corresponding to each abnormal link to the target person, so that after the target person processes the at least one abnormal link and the abnormal reason, real-name authentication of the user is completed.
Optionally, in some embodiments, before acquiring buried point data for real-name authentication performed by a user from a target server based on a current authentication channel, the acquiring module 200 is specifically configured to: judging whether the identity information of the user meets a first preset authentication condition or not; if the identity information does not meet the first preset authentication condition, generating first embedded point information, otherwise, judging whether the vehicle information of the user meets a second preset authentication condition or not; if the vehicle information of the user does not meet the second preset authentication condition, second embedded point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged; if the operator information does not meet a third preset authentication condition, generating third buried point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth buried point information; and obtaining buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
Optionally, in some embodiments, the real-name authentication apparatus further includes: the first embedded point information comprises authentication link information of identity information and an authentication failure reason; the second embedded point information comprises authentication link information and authentication failure reasons of the vehicle information; the third embedded point information comprises authentication link information and authentication failure reasons of the operator information; the third embedded point information comprises link information of the user completing real-name authentication.
Optionally, in some embodiments, before determining whether the vehicle information of the user meets the second preset authentication condition, the obtaining module 200 is further configured to: acquiring a first duration after the identity information of the user meets a first preset authentication condition; and if the duration is longer than the first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
Optionally, in some embodiments, before determining whether the operator information satisfies the third preset authentication condition, the obtaining module 200 is further configured to: acquiring a second duration after the vehicle information of the user meets a second preset authentication condition; and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
Optionally, in some embodiments, the real-name authentication apparatus further includes: and the sending module is used for sending the first timeout information and/or the second timeout information to the target personnel.
It should be noted that the explanation of the embodiment of the real-name authentication method described above is also applicable to the real-name authentication apparatus of this embodiment, and details are not described here.
According to the real-name authentication device provided by the embodiment of the application, whether real-name authentication of a user meets preset abnormal conditions is detected, when the fact that the real-name authentication of the user meets the preset abnormal conditions is detected, a current authentication channel of the user is obtained, data of embedded points of the user for the real-name authentication are obtained from a target server based on the current authentication channel, the data of the embedded points are analyzed, at least one abnormal link and abnormal reasons corresponding to each abnormal link are obtained, the at least one abnormal link and the abnormal reasons corresponding to each abnormal link are sent to a target person, and the real-name authentication of the user is completed after the target person processes the at least one abnormal link and the abnormal reasons. Therefore, the problems that a real-time monitoring authentication technology is lacked in the related technology, related abnormity is found and solved actively and the like are solved, real-name authentication efficiency is improved, and after-sale automobile software service experience of a user is improved.
Fig. 6 is a schematic structural diagram of a server according to an embodiment of the present application. The server may include:
a processor 60, storage means 61 and communication means 62; the number of the processors 60 in the server may be one or more, and one processor 860 is taken as an example in fig. 6; the processor 60, the storage device 61 and the communication device 62 in the server may be connected by a bus or other means, and the bus connection is taken as an example in fig. 6.
Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, where the program, when executed by a processor, implements the real-name authentication method as above.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or N embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "N" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more N executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of implementing the embodiments of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the N steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are well known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a programmable gate array, a field programmable gate array, or the like.
It will be understood by those skilled in the art that all or part of the steps carried out in the method of implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and the program, when executed, includes one or a combination of the steps of the method embodiments.
While embodiments of the present application have been shown and described above, it will be understood that the above embodiments are exemplary and should not be construed as limiting the present application and that changes, modifications, substitutions and alterations in the above embodiments may be made by those of ordinary skill in the art within the scope of the present application.
Claims (10)
1. A real-name authentication method is characterized by comprising the following steps:
detecting whether real-name authentication of a user meets a preset abnormal condition;
when detecting that the real-name authentication of the user meets a preset abnormal condition, acquiring a current authentication channel of the user, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; and
analyzing the data of the buried points to obtain at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person, so that after the target person processes the at least one abnormal link and the abnormal reason, real-name authentication of the user is completed.
2. The method of claim 1, further comprising, before obtaining the buried point data for real-name authentication of the user from the target server based on the current authentication channel:
judging whether the identity information of the user meets a first preset authentication condition or not;
if the identity information does not meet the first preset authentication condition, first embedded point information is generated, and if not, whether the vehicle information of the user meets a second preset authentication condition is judged;
if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged;
if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information;
and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
3. The method of claim 2, comprising:
the first embedded point information comprises authentication link information and authentication failure reasons of the identity information;
the second embedded point information comprises authentication link information and an authentication failure reason of the vehicle information;
the third embedded point information comprises authentication link information and authentication failure reasons of the operator information;
the third embedded point information comprises link information of the user completing real-name authentication.
4. The method according to claim 2, before determining whether the vehicle information of the user satisfies the second preset authentication condition, further comprising:
acquiring a first duration after the identity information of the user meets the first preset authentication condition;
and if the duration is longer than a first preset duration, generating first overtime information, and displaying the first overtime information on the real-name authentication service system.
5. The method according to claim 4, before determining whether the operator information satisfies the third preset authentication condition, further comprising:
acquiring a second duration after the vehicle information of the user meets the second preset authentication condition;
and if the second duration is longer than a second preset duration, generating second overtime information, and displaying the second overtime information on the real-name authentication service system.
6. The method of claim 5, further comprising:
and sending the first timeout information and/or the second timeout information to the target person.
7. A real-name authentication apparatus, comprising:
the detection module is used for detecting whether the real-name authentication of the user meets a preset abnormal condition;
the acquisition module is used for acquiring a current authentication channel of the user when detecting that the real-name authentication of the user meets a preset abnormal condition, and acquiring buried point data of the user for real-name authentication from a target server based on the current authentication channel; and
and the authentication module is used for analyzing the data of the buried points, obtaining at least one abnormal link and an abnormal reason corresponding to each abnormal link, and sending the at least one abnormal link and the abnormal reason corresponding to each abnormal link to a target person so as to finish real-name authentication of the user after the target person processes the at least one abnormal link and the abnormal reason.
8. The apparatus as claimed in claim 7, wherein before the obtaining of the buried point data for the real-name authentication of the user from the target server based on the current authentication channel, the obtaining module is specifically configured to:
judging whether the identity information of the user meets a first preset authentication condition or not;
if the identity information does not meet the first preset authentication condition, first embedded point information is generated, otherwise, whether the vehicle information of the user meets a second preset authentication condition is judged;
if the vehicle information of the user does not meet the second preset authentication condition, second buried point information is generated, and if not, whether the operator information meets a third preset authentication condition is judged;
if the operator information does not meet the third preset authentication condition, generating third embedded point information, otherwise, completing real-name authentication of the user and simultaneously generating fourth embedded point information;
and obtaining the buried point data according to the first buried point information, the second buried point information, the third buried point information and/or the fourth buried point information, and sending the buried point data to the target server.
9. A server, characterized in that the server comprises:
one or more processors;
a storage device to store one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the real-name authentication method of any one of claims 1-6.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the real-name authentication method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211176796.7A CN115499232A (en) | 2022-09-26 | 2022-09-26 | Real-name authentication method, device, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211176796.7A CN115499232A (en) | 2022-09-26 | 2022-09-26 | Real-name authentication method, device, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115499232A true CN115499232A (en) | 2022-12-20 |
Family
ID=84472224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211176796.7A Pending CN115499232A (en) | 2022-09-26 | 2022-09-26 | Real-name authentication method, device, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115499232A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116015959B (en) * | 2023-01-03 | 2024-06-11 | 重庆长安汽车股份有限公司 | Real name authentication method, device, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112491611A (en) * | 2020-11-25 | 2021-03-12 | 网银在线(北京)科技有限公司 | Fault location system, method, apparatus, electronic device and computer readable medium |
CN113094238A (en) * | 2021-04-25 | 2021-07-09 | 深圳前海微众银行股份有限公司 | Method and device for monitoring abnormity of business system |
CN114257451A (en) * | 2021-12-22 | 2022-03-29 | 广州品唯软件有限公司 | Verification interface replacing method and device, storage medium and computer equipment |
-
2022
- 2022-09-26 CN CN202211176796.7A patent/CN115499232A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112491611A (en) * | 2020-11-25 | 2021-03-12 | 网银在线(北京)科技有限公司 | Fault location system, method, apparatus, electronic device and computer readable medium |
CN113094238A (en) * | 2021-04-25 | 2021-07-09 | 深圳前海微众银行股份有限公司 | Method and device for monitoring abnormity of business system |
CN114257451A (en) * | 2021-12-22 | 2022-03-29 | 广州品唯软件有限公司 | Verification interface replacing method and device, storage medium and computer equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116015959B (en) * | 2023-01-03 | 2024-06-11 | 重庆长安汽车股份有限公司 | Real name authentication method, device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104572320B (en) | Method for confirming correction program and information processing equipment | |
US8676432B2 (en) | Fault prediction framework using temporal data mining | |
WO2018232936A1 (en) | Fault repair method and apparatus for shared device | |
CN109733238B (en) | Fault detection method, device, storage medium and processor | |
CN102439568A (en) | System health and performance care of computing devices | |
CN114327543A (en) | Online upgrading method and device for vehicle-mounted controller, vehicle and storage medium | |
CN111752850B (en) | Method and related equipment for testing block chain system | |
CN109739536A (en) | The method, apparatus and storage medium of vehicle remote firmware updating | |
CN113377403A (en) | Vehicle remote software upgrading method and device | |
CN112134961B (en) | Client use control method, client and computer storage medium | |
CN112363920A (en) | Test case repairing method and device, computer equipment and storage medium | |
CN111311044A (en) | Vehicle damage assessment method and system | |
CN113918123A (en) | Product optimization management system and method | |
CN115499232A (en) | Real-name authentication method, device, server and storage medium | |
CN116257270A (en) | Vehicle, upgrading method and device of vehicle | |
CN111258820A (en) | OBU (on-board unit) equipment activation method, terminal equipment and server | |
CN112242917A (en) | Internet of vehicles service quality detection method and system | |
CN115220989B (en) | Payment software monitoring method, device and system | |
CN115118577A (en) | Method and device for determining remote upgrade abnormal reason, electronic equipment and storage medium | |
CN117261924A (en) | Vehicle control method, device, equipment and storage medium | |
CN115185252A (en) | Remote diagnosis method and device based on automobile fault lamp | |
CN114356769A (en) | Software learning method, device, equipment and storage medium | |
JP2019144752A (en) | Verification terminal | |
WO2015172488A1 (en) | Method and apparatus for detecting network access faults of wireless communication device, and wireless communication device | |
CN115050117B (en) | Vehicle diagnosis report generation method and device and diagnosis equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |