CN115730944A - Identity verification method and device - Google Patents

Identity verification method and device Download PDF

Info

Publication number
CN115730944A
CN115730944A CN202211374010.2A CN202211374010A CN115730944A CN 115730944 A CN115730944 A CN 115730944A CN 202211374010 A CN202211374010 A CN 202211374010A CN 115730944 A CN115730944 A CN 115730944A
Authority
CN
China
Prior art keywords
verification
real person
identity
person information
service request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211374010.2A
Other languages
Chinese (zh)
Inventor
吕斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211374010.2A priority Critical patent/CN115730944A/en
Publication of CN115730944A publication Critical patent/CN115730944A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses an identity verification method, which comprises the following steps: under the condition of receiving a preset service request, judging the account type corresponding to the service request; initiating an account identity verification request to acquire real person information corresponding to the group account under the condition that the account type is the group account; selecting a preset verification mode according to the real person information, and performing real person identity verification through the verification mode; and under the condition that the identity verification of the entity passes, confirming that the account identity verification passes, and executing the service request. Correspondingly, the invention discloses an identity verification device.

Description

Identity verification method and device
Technical Field
The present invention relates to data processing technologies, and in particular, to an identity verification method and apparatus.
Background
A large number of historical users are not bound with mobile phone numbers or mailboxes in an enterprise account system in the current payment platform, the enterprise accounts are mainly finished by staff at a PC (personal computer) terminal, and business operation is lack of nuclear means in high-risk scenes. When enterprise employees operate the high-risk scenes of enterprise accounts through the PC, such as changing payment passwords, changing binding mobile phone numbers, carrying out large-amount fund transaction, carrying out self-service limitation solving and the like, the large-amount transaction risk of the enterprises cannot be released only by account numbers and passwords.
In the prior art, the operation of enterprises can only be blocked due to lack of means for releasing high-risk risks, and the risk level is low through ways such as a mailbox, so that the risk level is easily broken by black and grey products to cause client investment loss. In view of the above, it is desirable to verify the identity of an enterprise account in a secure and efficient manner by a new identity verification method.
Disclosure of Invention
One of the objectives of the present invention is to provide an identity verification method, which can implement verification of a group account through an entity identity verification.
Based on the above object, the present invention provides an identity verification method, which comprises the steps of:
under the condition of receiving a preset service request, judging an account type corresponding to the service request;
initiating an account identity verification request to acquire real person information corresponding to the group account under the condition that the account type is the group account;
selecting a preset verification mode according to the real person information, and performing real person identity verification through the verification mode;
confirming that the account identity verification passes under the condition that the entity identity verification passes,
and executing the service request.
In the invention, the identity verification of the group account is realized by judging the account type of the service request, acquiring the real person information under the condition that the account type is the group account and verifying the identity of the natural person, thereby realizing the efficient and reliable identity verification of the group account.
Further, in some embodiments, the method further comprises:
sending a verification certificate to a user side corresponding to the real person information in the verification mode;
and acquiring an input certificate of the service request initiating terminal, and judging that the identity verification of the real person information is passed under the condition that the verification certificate is the same as the input certificate.
Further, in some embodiments, performing the entity identity verification by the verification means includes:
sending an operation instruction to the service request initiating terminal by the verification mode, wherein the operation instruction is used for guiding the service request initiating terminal to execute verification operation;
and under the condition that the verification operation corresponding to the operation instruction is detected, judging that the identity verification of the real person information is passed.
Further, in some embodiments, performing the entity identity verification by the verification means includes:
and sending a verification path corresponding to the verification mode to a user side corresponding to the real person information, wherein the user side initiates biological identification identity verification through the verification path.
Further, in some embodiments, the obtaining of the real person information corresponding to the group account includes,
acquiring an actual person information list corresponding to the group account, and returning the actual person information list to the service request initiating end;
and responding to the selection input of the service request initiating end in the real person information list, and determining the real person information.
Further, in some embodiments, after obtaining the real person information corresponding to the group account, the method further includes:
sending the real person information and the verification mode to the service request initiating end to obtain the validity confirmation result of the verification mode;
and after the effective confirmation of the verification mode is received, performing the identity verification of the entity through the verification mode.
Further, in some embodiments, after sending the real person information and the verification manner to the service request initiating terminal, the method includes:
and under the condition of receiving the invalid confirmation of the verification mode, acquiring the updated verification mode from the service request initiating end, and performing the entity identity verification through the updated verification mode.
Further, in some embodiments, after obtaining the updated verification means, the method further includes:
and verifying the updated verification mode, and verifying the identity of the real person information through the updated verification mode under the condition that the updated verification mode is valid.
Another object of the present invention is to provide an identity verification apparatus, which can perform the identity verification of the group account by means of the identity verification of the real person.
Based on the above object, the present invention further provides an identity verification apparatus, a verification module, and a service module and a resource module in data communication with the verification module:
the method comprises the steps that under the condition that a preset service request is received by a service module, the account type corresponding to the service request is judged; initiating an account identity verification request under the condition that the account type is a group account;
the verification module receives an account verification request and acquires real person information corresponding to the group account from the resource module;
the verification module determines a preset verification mode according to the real person information, performs real person identity verification through the verification mode and returns a verification result to the service module;
and the service module executes the service request under the condition that the verification result passes.
Further, in some embodiments, the verification module sends a verification certificate to the user side corresponding to the real person information through the verification mode;
the verification module obtains an input certificate of a service request initiating terminal, and judges that the identity verification of the real person information is passed under the condition that the verification certificate is the same as the input certificate.
Further, in some embodiments, the verification module sends an operation instruction to the service request initiating terminal through the verification manner, where the operation instruction is used to direct the service request initiating terminal to perform a verification operation;
and feeding back the verification operation to the verification module under the condition that the service module detects that the verification operation corresponding to the operation instruction occurs, wherein the verification module judges that the identity verification of the real person information passes.
Further, in some embodiments, the verification module sends a verification path corresponding to the verification manner to a user side corresponding to the real person information, and the user side initiates the biometric identity verification through the verification path.
Further, in some embodiments, the verification module receives a group account identity verification request, acquires an entity information list corresponding to the group account from the resource module, and returns the entity information list to the service request initiating end;
and the verification module responds to the selection input of the service request initiating terminal to the real person information list and determines the real person information.
Further, in some embodiments, the verification module sends the real person information and a verification mode to the service request initiating terminal to obtain a validity confirmation result of the verification mode;
and after receiving the effective confirmation of the verification mode, the verification module performs the identity verification of the real person through the verification mode.
Further, in some embodiments, the verification module obtains the updated verification manner from the service request initiating terminal when receiving the validation confirmation of the verification manner, and performs the identity verification of the entity through the updated verification manner.
Further, in some embodiments, the verification module verifies the updated authentication method through the resource module, and verifies the identity of the real person information through the updated authentication method under the condition that the updated authentication method is valid
The present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed on a computer, causes the computer to perform the steps of the identity verification method of the present invention.
The invention also provides a computing device comprising a memory and a processor, the memory having stored therein executable code which, when executed by the processor, performs the steps of the identity verification method of the invention.
The identity verification method and the identity verification device have the following beneficial effects: the verification of the group account is realized through the entity identity verification, and the group account is safely and efficiently verified, so that the feasibility of executing high-risk business on the group account is realized.
Drawings
Fig. 1 exemplarily shows a flow chart of the identity verification method according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of an identity verification apparatus according to an embodiment of the present invention.
Fig. 3 is a flowchart illustrating steps performed by the identity verification apparatus according to an embodiment of the present invention.
Detailed Description
The identity verification method and apparatus of the present invention will be described in further detail below with reference to the drawings and specific examples, but the detailed description is not meant to limit the invention.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
In one embodiment of the invention, an identity verification method is provided. Fig. 1 exemplarily shows a flow chart of the identity verification method according to an embodiment of the present invention.
As shown in fig. 1, the identity verification method includes the steps of:
100: and under the condition of receiving a preset service request, judging the account type corresponding to the service request.
The identity verification method in this embodiment may be applied to various types of service platforms with high requirements on account security, for example, a platform for reading files or data with high confidentiality or a platform related to large-volume transactions. On the platform, some business operations with higher operation risks exist, for example, for a financial transaction platform, operations of modifying a payment secret, changing a mobile phone number corresponding to an account number, performing large-amount fund transaction, modifying and contacting self-service authority and the like can bring serious consequences to account security. Therefore, the platform has strict safety control on the operation.
Generally, in order to ensure the safety of the operation, identity verification is performed on a person who performs the operation, such as inputting a password or performing face verification, and the safety of the operation itself is ensured by confirming the reliability of an operator.
However, on this type of platform, there are not only individual accounts, but also accounts belonging to a group other than an individual, like a public account or an enterprise account. The processing authority of the account is usually mobile, and can be transmitted in a mode that a platform cannot track or record in a group or an enterprise. It is also difficult for the platform to acquire all personal information that can operate the account in advance. On the other hand, if the reliability of the operation executor is confirmed only by the input of the password, it is possible for the general business type, but it is difficult to provide sufficient security for the high-risk type of operation.
For non-personal accounts, a more secure identity verification needs to be performed. Therefore, when the service platform receives a preset high-risk service request, the type of the account initiating the service request is firstly distinguished, and whether the account is a personal account or a non-personal account is judged.
110: and initiating an account identity verification request and acquiring real person information corresponding to the group account under the condition that the account type is the group account.
And under the condition that the account type is detected to be the non-individual account, calling the identity verification of the group account to judge whether the operation executor is authorized to perform the preset high-risk operation on the group account. It should be noted that the identity verification of the group account is not necessarily performed for the operation executor itself, but may be performed for a third person different from the current operation executor, who is not currently involved or even logged in the platform.
The actual person information described in this embodiment is natural person information, as opposed to the group concept that may be an unnatural person as described above. The natural person corresponding to the real person information can be understood as the authority management entry of the group account, that is, the natural person has management authority and authorization authority for the corresponding group account. The sources of real-world information corresponding to the community accounts may be varied. Alternatively, the real person information may be a person who specifies settings at the time of establishment of the group account, and the person may be a specific person or a specific role in the group. For example, when setting up the group account, a may be designated as an entity corresponding to the group account, or a group chairman may be designated as an entity corresponding to the group account. In the case that a specific role in a designated group is an entity corresponding to a group account, the platform needs to obtain information about the entity corresponding to the specific role by periodically updating the role setting of the group.
For example, in the case that the group account is an enterprise account, the corresponding real person information may be a legal representative or an authorized legal representative. When the real person information is a legal representative, the input entry related to the legal representative information from the client can be obtained when the account is created, and the corresponding legal representative, the communication information, the identity ID and the like of the account are recorded in the entry, so that the entry information is called from the database corresponding to the account when the identity verification request of the enterprise account is initiated. Alternatively, the legal representative information can be obtained through the enterprise information inquiry platform. The enterprise information query platform for querying the legal representative of the enterprise and the service platform in this embodiment may be mutually independent platforms, and perform data communication with the enterprise information query platform when the service platform has a query requirement, and the enterprise information query platform may also be integrated with the service platform, or the service platform itself may provide an enterprise information query function.
In some embodiments, the real person information is not unique. For a group account, there may be a preset real person list, so that under the condition of an account identity verification request, the service platform may obtain a corresponding real person information list. The service platform can feed back the real person information list to the service request initiating terminal, and the service request initiating terminal executes the selection operation, so that the real person needing identity verification is finally determined. Further, the priority ranking of the personnel on the real person information list can be carried out through the priority preset by the service platform. For example, besides the enterprise legal representatives, the current manager information of the enterprise can be obtained, the legal representatives are of a first priority, and in the case that the identity verification cannot be performed on the legal representatives, the managers ranked at a second priority can be selected to perform the identity verification. Alternatively, in a scenario with higher security requirements, identity verification may be performed on all people on the real people list at the same time.
In some embodiments, in order to further improve the verification reliability of the real person information and the verification mode, after the real person information and the verification mode are obtained, the real person information and the verification mode are sent to the service request initiating terminal, and validity confirmation of the service request initiating terminal on the information is obtained. And after the effective confirmation of the verification mode is received, performing the identity verification of the entity through the verification mode. For example, when the obtained real person information is the name of a natural person, and the verification mode is short message verification and a corresponding telephone number, the information including the name and the telephone of the manager corresponding to the group account and the identity verification through the short message mode is sent to the service request initiating terminal, and the operation executor at the service request initiating terminal performs validity feedback after checking the information. Alternatively, in the case where the real person information includes sensitive information, the sensitive information may be desensitized, for example, when the real person name and the telephone are sent to the service request originating terminal, the middle four digits of the telephone number may be hidden, or even only the last four digits of the telephone number may be displayed, so as to improve privacy. Identity verification according to the confirmed information has higher safety and accuracy.
In some embodiments, the updated verification method is obtained from the service request initiating terminal when the service request initiating terminal feeds back the real person information or the verification method is invalid. Illustratively, when the service request initiating end finds that the real person information fed back by the service platform is wrong or the verification mode is wrong, the effective real person information can be re-input or the verification mode can be re-selected. And the service platform performs the entity identity verification in an updated verification mode.
In some embodiments, a second verification is performed on the information updated by the service request originator. Illustratively, if the pre-stored mobile phone number of the legal representative is invalid, and the service request initiator inputs the updated mobile phone number, the service platform verifies the name and the mobile phone number of the legal representative through the operator database, and executes identity verification when the input mobile phone number is confirmed to be the current mobile phone number of the legal representative. Optionally, the database used in the verification in this embodiment is different from the database for acquiring the real person information and the verification manner, the real person information and the verification manner may be information pre-stored on the service platform, and the database in this embodiment is a trusted database maintained in real time. Thereby further improving the accuracy of the identity verification.
120: and selecting a preset verification mode according to the real person information, and performing real person identity verification through the verification mode.
Besides acquiring the real person information, the verification mode can be confirmed according to the real person information. The verification method may be preset corresponding to the real person information, for example, for the real person a corresponding to a certain group account, the set verification method is biometric identification, and in this step, the identity of the real person a is verified in a biometric identification manner. The verification mode may also be uniformly preset by the service platform, for example, when the verification mode uniformly set by the service platform is short message verification, the corresponding mobile phone number is obtained according to the actual person information, and the verification code is sent in a short message mode to perform identity verification.
Optionally, the preset authentication manner is not limited to one, and for the real person a corresponding to a certain group account, the preset authentication manner includes biometric identification and short message authentication, and the identity of the real person a can be verified through one of the above manners. The selection of the verification mode may be a preset selection rule, for example, the verification mode is selected according to a time period; or the verification modes are sorted according to the priority, and when the verification mode of the first priority cannot be realized, the verification mode of the second priority is selected in sequence. In other embodiments, the selectable verification mode may also be sent to the service request initiating terminal, and the service request initiating terminal selects the verification mode according with the current scenario.
It should be noted that the entity identity verification described in this embodiment may include not only verification of the entity identity characteristic, but also notification of the service request. For example, the identity verification information further includes information informing that the XX account is performing the XX operation, and performing the identity verification is authorization of the operation, that is, the authentication is performed while performing the authorization.
130: and under the condition that the identity verification of the entity passes, confirming that the account identity verification passes, and executing the service request.
And finally, under the condition that the identity verification of the entity passes, the identity verification of the account is confirmed to pass, and the platform executes a corresponding response task according to the content of the service request.
Through the steps, when the high-risk business operation occurs to the group account, the security check of the group account is converted into the personal check of the administrator of the group account, so that the security of the group account is improved, and the flexibility of the group account for executing the high-risk business operation is also improved.
In some embodiments, the physical identity check is performed by means of static codes. And sending a verification certificate to the user side corresponding to the real person information in a verification mode corresponding to the real person information. Illustratively, under the condition that the verification mode corresponding to the real person information is short message verification, a verification code is sent to a mobile phone corresponding to the real person information in a short message mode. For example, when the authentication method corresponding to the real person information is a client of a specific application, the verification certificate may be transmitted by the client of the application. Optionally, in the case that the verification mode is a service platform for executing the service request, the verification certificate is sent to the user side corresponding to the real person information through the service platform. The verification certificate can be a set of numbers or letters, and can also be other static information forms which can perform comparison. In some embodiments, in order to send the verification certificate to the user side corresponding to the real person information, a communication mode or a user side account corresponding to the natural person may be obtained according to the real person information through a preset query platform. For example, the operator platform inquires the mobile phone number of the real person through the name or the identity ID in the real person information, and sends a verification code in a short message mode through the mobile phone number,
After the corresponding real person obtains the verification certificate, the corresponding real person transmits the information to the service request operation executor at the service request initiating end side through offline or other ways. The process of transferring the verification certificate is also the process of authorization, namely, the manager corresponding to the group account already knows the high-risk operation request and authorizes the right of the current operation request operation executor to continue the operation. And after the service request operation executor acquires the verification certificate, sending the certificate to the service platform from the service request initiator. And the service platform acquires the input certificate of the service request initiating terminal and compares the verification certificate with the input certificate. And under the condition that the verification certificate is the same as the input certificate, judging that the identity verification of the real person information passes.
In some embodiments, the human identity check is not limited to static check codes, but may be a dynamic operation. For example, the real person is instructed to use a money which is made by a designated amount to the service platform supervision account through a public account for verifying the identity of the enterprise account operator, the service platform receives the money and is regarded as completing identity verification, and the money is returned after the verification is completed. The dynamic operation mode is not limited to small transfer, and any detectable operation can be performed on the service platform, such as changing certain settings, or clicking a specified module on a specified interface, and the like, and the platform is regarded as identity verification passing if the operation is detected.
In some embodiments, the physical identity verification is performed by way of biometric verification. For example, a service platform performs message pushing or pop-up reminding on a personal account corresponding to an actual person to inform the natural person that a group account managed by the natural person receives a high-risk type service request, and if the natural person confirms that the request is executable, biometric verification can be performed to verify the identity of the actual person. The community account administrator may verify the identity through biometric verification. The biometric authentication includes but is not limited to various biometric identification methods such as face recognition, iris recognition, fingerprint recognition, etc.
The embodiment provides more verification modes for the personal verification, so that the identity verification flexibility of the real person is higher. Meanwhile, various verification modes can be suitable for different scenes, so that the identity verification is more reliable.
In another embodiment of the present invention, an identity verification apparatus is provided, and fig. 2 exemplarily shows a schematic diagram of an identity verification apparatus according to an embodiment of the present invention, and as shown in fig. 3, an identity verification apparatus 20 includes a verification module 22, and a service module 24 and a resource module 26 in data communication with the verification module 22.
The verification module, the service module and the resource module can be integrated on the same service platform, and can also be located in different service modules, for example, the verification module is arranged on a single verification platform, the verification platform is connected with various different types of service platforms, and the high-risk service request of any service platform can call the account verification function of the verification module in the verification platform. The resource module can be more than one, the verification module can perform data interaction with a plurality of resource modules at the same time, and the resource modules can be arranged in a static pre-stored database or a dynamic real-time updating platform, such as an enterprise information query platform, a communication mode query platform and the like.
Fig. 3 is a flowchart illustrating steps performed by the identity verification apparatus according to an embodiment of the present invention.
As shown in fig. 3, in some embodiments, the feature privacy preserving apparatus performs the steps of:
300: the method comprises the steps that under the condition that a service module receives a preset service request, the account type corresponding to the service request is judged; and in the case that the account type is a group account, initiating a group account verification request to the verification module.
The business modules are generally arranged on various business platforms with high requirements on account security, such as a platform for reading files or materials with high confidentiality or a platform related to large-amount transactions. On the platform, some business operations with higher operation risks exist, for example, for a financial transaction platform, operations of modifying a payment secret, changing a mobile phone number corresponding to an account number, performing large-amount fund transaction, modifying and contacting self-service authority and the like can bring serious consequences to account security. Therefore, the security control of this type of operation by the platform is extremely strict.
On this type of platform, there are not only personal accounts, but also accounts belonging to a group other than an individual, like public accounts or enterprise accounts. The processing authority of the account is usually mobile, and can be transmitted in a mode that a platform cannot track or record in a group or an enterprise. It is also difficult for the platform to acquire all personal information that can operate the account in advance. On the other hand, if the reliability of the operation executor is confirmed only by the input of the password, it may be sufficient for the general business type, but it is difficult to provide sufficient security for the high-risk type of operation.
For non-personal accounts, a higher level of security identity verification needs to be performed. Therefore, when the service platform receives a preset high-risk service request, the service module firstly distinguishes the account type initiating the service request, and judges whether the account is a personal account or a non-personal account.
310: the verification module receives the group account verification request and acquires real person information corresponding to the group account from the resource module.
And under the condition that the verification module detects that the account type is the non-individual account, the verification module calls the identity verification of the group account and judges whether the operation executor is authorized to perform preset high-risk operation on the group account. The identity verification of the group account is not necessarily for the operation performer itself, but may be for a third person who is not currently participating or even logged on the platform, different from the current operation performer.
The actual person information described in this embodiment is natural person information, as opposed to the group concept that may be an unnatural person as described above. The natural person corresponding to the real person information can be understood as the authority management entry of the group account, that is, the natural person has the highest operation and authorization authority for the corresponding group account. The sources of real-world information corresponding to the community accounts may be varied. Alternatively, the real person information may be a person who specifies settings at the time of establishment of the group account, and the person may be a specific person or a specific role in the group. For example, when a group account is set up, a may be designated as an entity corresponding to the group account, or a group chairman may be designated as an entity corresponding to the group account.
For example, in the case that the group account is an enterprise account, the corresponding real person information may be a legal representative or an authorized legal representative. When the real person information is a legal representative, the resource module is an input entry database from the client during account creation, and the legal representative information during account creation is recorded in the input entry database, so that when an identity verification request of the enterprise account is initiated, corresponding entry information is called from the database. Alternatively, the resource module may be an enterprise information query platform for querying a legal representative of the enterprise, and the legal representative information may be obtained through the resource module.
In some embodiments, the real person information is not unique. For a group account, there may be a preset real person list, so that in the case of receiving an account identity verification request, the verification module may obtain a corresponding real person information list, feed back the real person information list to the service request initiating terminal, and execute a selection operation by the service request initiating terminal, thereby finally determining the real person required to perform identity verification. Further, the priority ranking of the personnel on the real person information list can be carried out through the priority preset by the service platform. For example, in addition to the enterprise legal representatives, the current manager information of the enterprise can be obtained, the legal representatives are of a first priority, and in the case that the identity verification cannot be performed on the legal representatives, the managers arranged at a second priority can be selected to perform the identity verification. Alternatively, in a scenario with higher security requirements, identity verification may be performed on all people on the real person list at the same time.
In some embodiments, in order to further improve the verification reliability of the real person information and the verification mode, after the real person information and the verification mode are obtained, the verification module sends the real person information and the verification mode to the service request initiating terminal, and obtains the validity confirmation of the service request initiating terminal for the information. And after the effective confirmation of the verification mode is received, the verification module performs the identity verification of the entity through the verification mode. For example, when the obtained real person information is the name of a natural person, and the verification mode is short message verification and a corresponding telephone number, the information including the name and the telephone of the manager corresponding to the group account and the identity verification through the short message mode is sent to the service request initiating terminal, and the operation executor at the service request initiating terminal performs validity feedback after checking the information. The identity verification according to the confirmed information has higher safety and accuracy.
In some embodiments, the updated verification method is obtained from the service request initiating terminal when the service request initiating terminal feeds back the real person information or the verification method is invalid. Illustratively, when the service request initiating end finds that the real person information fed back by the service platform is wrong or the verification mode is wrong, the effective real person information can be re-input or the verification mode can be re-selected. And the service platform performs the identity verification of the entity through the updated verification mode.
In some embodiments, a second verification is performed on the information updated by the service request originator. Illustratively, if the pre-stored mobile phone number of the legal representative fails, and the service request initiator inputs the updated mobile phone number, the verification module verifies the legal representative name and the mobile phone number through the operator database in the resource module, and executes identity verification when the input mobile phone number is confirmed to be the current mobile phone number of the legal representative. Optionally, a resource module used in the secondary verification in this embodiment is different from the resource module for obtaining the real-person information and the verification manner, where the real-person information and the verification manner may be from a resource module including information pre-stored on a service platform, and the database in this embodiment is from a resource module including a trusted database maintained in real time. Thereby further improving the accuracy of the identity verification.
320: the verification module determines a preset verification mode according to the real person information and conducts real person identity verification through the verification mode.
Besides acquiring the actual person information, the verification mode can be confirmed according to the actual person information. The verification method may be preset corresponding to the real person information, for example, for the real person a corresponding to a certain group account, the set verification method is biometric identification, and in this step, the identity of the real person a is verified in a biometric identification manner. The verification mode may also be uniformly preset by the service platform, for example, when the verification mode uniformly set by the service platform is short message verification, the corresponding mobile phone number is obtained according to the actual person information, and the verification code is sent in a short message mode to perform identity verification.
Optionally, the preset authentication manner is not limited to one, and for the real person a corresponding to a certain group account, the preset authentication manner includes biometric identification and short message authentication, and the identity of the real person a can be verified through one of the above manners. The selection of the verification mode may be a preset selection rule, for example, the verification mode is selected according to a time period; or the verification modes are sorted according to the priority, and when the verification mode of the first priority cannot be realized, the verification mode of the second priority is selected in sequence. In other embodiments, the selectable verification mode may also be sent to the service request initiating end, and the service request initiating end selects the verification mode that conforms to the current scenario.
It should be noted that the entity identity verification described in this embodiment may include verification of an entity identity characteristic, and notification of a service request. For example, the identity verification information further includes information informing that the XX account is performing the XX operation, and performing the identity verification is authorization of the operation, that is, the authentication is performed while performing the authorization.
330: and the service module executes the service request under the condition that the verification result passes.
And finally, under the condition that the identity verification of the entity passes, the verification module confirms that the identity verification of the account passes and sends a verification result to the service module, and the service module executes a corresponding response task according to the content of the service request.
Through the steps, when the high-risk business operation occurs to the group account, the identity verification device provided by the embodiment converts the security verification of the group account into the personal verification of the administrator of the group account, so that the security of the group account is improved, and the flexibility of executing the high-risk business operation by the group account is also improved.
An embodiment of the present invention also provides a computer-readable storage medium, on which a computer program is stored, which, when executed in a computer, causes the computer to perform the steps of causing the computer to perform the identity verification method in the above-mentioned embodiment of the present invention. Since the steps performed by the method are the same as those of the identity verification method described above, the description will not be repeated here.
One embodiment of the present invention provides a computing device comprising a memory and a processor, wherein the memory stores executable code, and when the processor executes the executable code, the processor performs the steps performed by the identity verification method in the above embodiment of the present invention. Since the steps performed by the method are the same as those of the identity verification method described above, the description will not be repeated here.
It should be noted that the above list is only specific examples of the present invention, and it is obvious that the present invention is not limited to the above examples, and many similar variations are possible. All modifications which can be derived or suggested by the person skilled in the art from the present disclosure are intended to be within the scope of the present invention.

Claims (18)

1. An identity verification method, comprising:
receiving a preset service request, and judging an account type corresponding to the service request;
initiating an account identity verification request to acquire real person information corresponding to the group account under the condition that the account type is the group account;
selecting a preset verification mode according to the real person information, and performing real person identity verification through the verification mode;
and under the condition that the identity verification of the entity passes, confirming that the account identity verification passes, and executing the service request.
2. The identity verification method of claim 1, wherein performing the identity verification by the verification means comprises:
sending a verification certificate to the user side corresponding to the real person information in the verification mode;
and acquiring an input certificate of the service request initiating terminal, and if the verification certificate is the same as the input certificate, the identity verification of the real person information is passed.
3. The identity verification method of claim 1, wherein performing the identity verification of the entity by the verification means comprises:
sending an operation instruction to the service request initiating terminal by the verification mode, wherein the operation instruction is used for guiding the service request initiating terminal to execute verification operation;
and under the condition that the verification operation corresponding to the operation instruction is detected, judging that the identity verification of the real person information is passed.
4. The identity verification method of claim 1, wherein performing the identity verification by the verification means comprises:
and sending a verification path corresponding to the verification mode to a user side corresponding to the real person information, wherein the user side initiates biological identification identity verification through the verification path.
5. The identity verification method of claim 1, wherein obtaining real person information corresponding to the group account comprises,
acquiring an entity information list of the group account, and returning the entity information list to the service request initiating end;
and responding to the selection input of the service request initiating end in the real person information list, and determining the real person information.
6. The identity verification method of claim 1, after obtaining the real person information corresponding to the group account, the method further comprising:
sending the real person information and the verification mode to the service request initiating end to obtain the validity confirmation result of the verification mode;
and after the effective confirmation of the verification mode is received, performing the identity verification of the entity through the verification mode.
7. The identity verification method according to claim 6, after sending the real person information and the verification means to the service request initiating terminal, the method comprises:
and under the condition of receiving the invalid confirmation of the verification mode, acquiring the updated verification mode from the service request initiating end, and performing the entity identity verification through the updated verification mode.
8. The identity verification method of claim 7, after obtaining the updated verification means, the method further comprising:
and verifying the updated verification mode, and verifying the identity of the real person information through the updated verification mode under the condition that the updated verification mode is valid.
9. An identity verification device comprising a verification module, and a service module and a resource module in data communication with the verification module:
the service module receives a preset service request and judges the account type corresponding to the service request; initiating an account identity verification request under the condition that the account type is a group account;
the verification module receives an account verification request and acquires real person information corresponding to the group account from the resource module;
the verification module determines a preset verification mode according to the real person information, performs real person identity verification through the verification mode and returns a verification result to the service module;
and the service module executes the service request under the condition that the verification result passes.
10. The identity verification device of claim 9,
the verification module sends a verification certificate to the user side corresponding to the real person information in the verification mode;
the verification module obtains an input certificate of a service request initiating terminal, and judges that the identity verification of the real person information is passed under the condition that the verification certificate is the same as the input certificate.
11. The identity verification device of claim 9,
the verification module sends an operation instruction to a service request initiating terminal through the verification mode, and the operation instruction is used for guiding the service request initiating terminal to execute verification operation;
and under the condition that the service module detects that the verification operation corresponding to the operation instruction occurs, the service module feeds back the verification operation to the verification module, and the verification module judges that the identity verification of the real person information passes.
12. The identity verification device of claim 9,
and the verification module sends a verification path corresponding to the verification mode to a user side corresponding to the real person information, and the user side initiates biological identification identity verification through the verification path.
13. The identity verification device of claim 9,
the verification module receives a group account identity verification request, acquires an actual person information list corresponding to the group account from the resource module, and returns the actual person information list to the service request initiating end;
and the verification module responds to the selection input of the service request initiating terminal to the real person information list and determines the real person information.
14. The identity verification device of claim 9,
the verification module sends the real person information and the verification mode to the service request initiating end to obtain the validity confirmation result of the verification mode;
and after receiving the effective confirmation of the verification mode, the verification module performs the identity verification of the real person through the verification mode.
15. The identity verification device of claim 13,
and the verification module acquires the updated verification mode from the service request initiating end under the condition of receiving the invalid confirmation of the verification mode, and performs the identity verification of the entity through the updated verification mode.
16. The identity verification device of claim 15,
and the verification module verifies the updated verification mode through the resource module and verifies the identity of the real person information through the updated verification mode under the condition that the updated verification mode is valid.
17. A computer-readable storage medium, characterized in that the storage medium stores a computer program which, when executed by a processor, implements the method of any of the preceding claims 1-8.
18. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-8 when executing the program.
CN202211374010.2A 2022-11-03 2022-11-03 Identity verification method and device Pending CN115730944A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211374010.2A CN115730944A (en) 2022-11-03 2022-11-03 Identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211374010.2A CN115730944A (en) 2022-11-03 2022-11-03 Identity verification method and device

Publications (1)

Publication Number Publication Date
CN115730944A true CN115730944A (en) 2023-03-03

Family

ID=85294547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211374010.2A Pending CN115730944A (en) 2022-11-03 2022-11-03 Identity verification method and device

Country Status (1)

Country Link
CN (1) CN115730944A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117333140A (en) * 2023-11-24 2024-01-02 贵州航天云网科技有限公司 Enterprise information service management system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117333140A (en) * 2023-11-24 2024-01-02 贵州航天云网科技有限公司 Enterprise information service management system and method
CN117333140B (en) * 2023-11-24 2024-02-20 贵州航天云网科技有限公司 Enterprise information service management system and method

Similar Documents

Publication Publication Date Title
EP3937456A1 (en) Universal digital identity authentication service
US20130138567A1 (en) Systems and methods for verifying identities in transactions
EP1847941A2 (en) Method and system afor resetting passwords
EP2751733B1 (en) Method and system for authorizing an action at a site
TW202029692A (en) Risk transaction processing method and apparatus, and device
CN106850693B (en) Real-name authentication method and real-name authentication system
EP2575099A1 (en) Electronic funds transfer
KR20210039920A (en) Mobile communication terminal for personal authentification, personal authentification system and personal authentification method using the mobile communication terminal
KR101282824B1 (en) Meeting attestation system and providing method thereof
CN115730944A (en) Identity verification method and device
EP3407241A1 (en) User authentication and authorization system for a mobile application
WO2021135549A1 (en) Service item processing permissions authorization method and apparatus, computer device, and storage medium
CN108270789A (en) Internetbank activating method, equipment, system and computer readable storage medium
CN110647737B (en) Enterprise user security authentication method and device in warehouse receipt system and electronic equipment
CN111709835A (en) Service processing method and system
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN107730259A (en) A kind of fingerprint method of payment and its device, user terminal
CN115001806B (en) Mobile phone bank login authorization method and device
CN115600178A (en) Transaction request processing method and device, electronic equipment and storage medium
GB2511279A (en) Automated multi-factor identity and transaction authentication by telephone
CN113438223A (en) Bank card security setting method and device
CN111738471A (en) Management method, device and system for ordering in advance
CN111222789A (en) Method, device, computer equipment and readable storage medium for improving service information confirmation efficiency
JP2018074388A (en) Authentication system, method, and program
KR102645446B1 (en) O2o based system and method for intermediating private investigation agent using blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination