CN115795561A - Method, electronic device, and computer storage medium for authenticating target object - Google Patents

Method, electronic device, and computer storage medium for authenticating target object Download PDF

Info

Publication number
CN115795561A
CN115795561A CN202211461678.0A CN202211461678A CN115795561A CN 115795561 A CN115795561 A CN 115795561A CN 202211461678 A CN202211461678 A CN 202211461678A CN 115795561 A CN115795561 A CN 115795561A
Authority
CN
China
Prior art keywords
data
verification
target object
verification task
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211461678.0A
Other languages
Chinese (zh)
Inventor
徐昌达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp Shanghai Branch
Original Assignee
China Construction Bank Corp Shanghai Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp Shanghai Branch filed Critical China Construction Bank Corp Shanghai Branch
Priority to CN202211461678.0A priority Critical patent/CN115795561A/en
Publication of CN115795561A publication Critical patent/CN115795561A/en
Pending legal-status Critical Current

Links

Images

Abstract

The present disclosure provides a method for verifying a target object, comprising: determining, at a control device, a validation task attribute for a target object; generating a verification task list, and selecting and sending a verification task to the associated computing equipment of the target object; uploading, via an associated computing device, data for the validation task to a blockchain platform for storage; in response to receiving data for the validation task from the associated computing device, determining whether the received data satisfies each of a plurality of threshold conditions; and determining that the validation task is successful in validation in response to the received data satisfying each threshold condition, wherein the plurality of threshold conditions includes at least that data for the validation task is collected via the associated computing device of the target object within a threshold time. The method and the device can obviously improve the convenience and efficiency of the verification process, and effectively avoid the acquired digital verification material from being tampered in advance, so that the accuracy of the verification result is improved.

Description

Method, electronic device, and computer storage medium for authenticating target object
Technical Field
Embodiments of the present disclosure relate generally to the field of forensics and, more particularly, to a method, electronic device, and computer storage medium for authenticating a target object.
Background
In many current scenarios, verification is required for a target object (e.g., without limitation, a target user, a target enterprise). For example, when a due diligence survey or evidence collection needs to be performed on a certain target object, the conventional method for verifying the target object generally needs to perform a field survey and evidence collection by assigning a person to the target object location (for example, but not limited to, a public letter agency, a legal service agency, or a financial service agency) to perform verification (for example, due diligence survey or evidence collection) to evaluate the authenticity of the target object, such as a production business situation, for confirming whether the target object passes the verification.
In summary, the conventional scheme for verifying the target object has the disadvantages that the verification process is complicated and time-consuming, and the collected digital verification material is easily tampered in advance.
Disclosure of Invention
The present disclosure provides a method, an electronic device, and a computer storage medium for verifying a target object, which can significantly improve convenience and efficiency of a verification process, and can effectively prevent collected digital verification materials from being tampered in advance, reduce the possibility of counterfeiting of the digital verification materials by the target object, and thereby increase accuracy of a verification result.
According to a first aspect of the present disclosure, there is provided a method of authenticating a target object, the method comprising: determining, at a control device, a validation task attribute for a target object; generating a verification task list based on the determined verification task attributes; randomly selecting at least one verification task from the verification task list, and sending the selected at least one verification task to the associated computing device of the target object, wherein the selected at least one verification task indicates that data aiming at the at least one verification task needs to be uploaded to the blockchain platform for storage through a predetermined application program run by the associated computing device through the associated computing device of the target object, and the predetermined application program is associated with the control device; in response to receiving data for at least one verification task from an associated computing device of the target object, determining whether the received data satisfies each of a plurality of threshold conditions; and determining that the at least one verification task was successfully verified in response to the received data satisfying each of the threshold conditions, the plurality of threshold conditions including at least that data for the at least one verification task was collected via the associated computing device of the target object within a threshold time.
According to a second aspect of the present disclosure, an electronic device is provided. The electronic device includes at least one processing unit and at least one memory. At least one memory is coupled to the at least one processing unit and stores instructions for execution by the at least one processing unit. The instructions, when executed by the at least one processing unit, cause the electronic device to perform the steps of the method of the first aspect of the disclosure.
In a third aspect of the disclosure, a computer-readable storage medium is provided. The computer readable storage medium has stored thereon a computer program which, when executed by a machine, causes the machine to carry out the steps of the method described according to the first aspect of the disclosure.
In some embodiments, further comprising: in response to the received data not all meeting the threshold condition, generating at least one prompt for verification task verification failure; and re-randomly selecting at least one verification task from the verification task list, and sending the re-selected at least one verification task to the target object so as to re-verify the target object.
In some embodiments, the data for the at least one verification task comprises at least one of: image information, video information and/or geographical location information of the surrounding environment when the target object performs the at least one authentication task, acquired by an associated computing device running the predetermined application, and data information, screenshot information and/or a timestamp acquired by the target object browsing the website through a browser built in the predetermined application according to the at least one authentication task.
In some embodiments, the plurality of threshold conditions further comprises: the geographic position information of the target object when the target object executes the at least one verification task does not exceed the range of the threshold area, or the data aiming at the at least one verification task is data which is not stored by the associated computing equipment of the target object.
In some embodiments, randomly selecting at least one verification task from a list of verification tasks and sending the selected at least one verification task to an associated computing device of the target object comprises: randomly selecting a plurality of verification tasks from a verification task list; setting a time period to transmit the selected plurality of authentication tasks; sending the selected plurality of verification tasks to the target object at any point in time over a period of time.
In some embodiments, further comprising: confirming whether the currently selected at least one verification task is the same as the previously selected verification task; in response to determining that the currently selected at least one verification task is the same as the previously selected verification task, comparing the received data for the currently selected verification task with the data for the previously selected same verification task; generating at least one indication that the validation task failed if the difference between the data for the currently selected validation task and the data for the same previously selected validation task is outside of a threshold range.
In some embodiments, further comprising: determining that the target object fails to verify in response to not receiving data for the at least one verification task from the associated device of the target object for a predetermined period, or re-randomly selecting the at least one verification task from the list of verification tasks for a number of times exceeding a threshold number of times within the predetermined period.
In some embodiments, further comprising: determining a webpage which is associated with the current verification task and is to be browsed by a target object through a browser built in a preset application program; determining whether a website to which a webpage to be browsed belongs to a preset data set or not; in response to determining that the website to which the webpage to be browsed belongs to the preset data set, directly calling an associated address of the website from the preset data set so as to link to the webpage to be browsed; determining whether page data of the webpage comprise structured data meeting a preset condition or not based on the called associated address of the website; in response to determining that the page data of the webpage comprises structured data meeting a predetermined condition, directly parsing the page code of the webpage to obtain data for a current verification task; and uploading the obtained data to a block chain platform for storage.
In some embodiments, further comprising: invoking an internal screenshot function of the associated computing device in response to the page data of the web page not including structured data that satisfies a predetermined condition; and screenshot is conducted on the webpage, so that screenshot webpage information can be uploaded to the block chain platform to be stored.
In some embodiments, further comprising: confirming whether a server certificate of the website passes verification; and in response to the fact that the website does not have the server certificate or the server certificate of the website is not verified, calling a predetermined server associated with the cloud platform, wherein the predetermined server is an HTTP DNS server, so that the website is accessed through the predetermined server, and the accessed website is matched with the associated address of the called website.
In some embodiments, uploading the obtained data to the blockchain platform for storage comprises: signing and encrypting data; and uploading the data subjected to the signature and encryption to the blockchain platform for storage together with the timestamp of the obtained data.
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the disclosure, nor is it intended to be used to limit the scope of the disclosure.
Drawings
The above and other objects, features and advantages of the embodiments of the present disclosure will become more readily understood through the following detailed description with reference to the accompanying drawings. In the drawings, various embodiments of the present disclosure will be described by way of example and not limitation.
Fig. 1 shows a schematic diagram of a system for a method of authenticating a target object according to an embodiment of the present disclosure.
Fig. 2 shows a flow diagram of a method for authenticating a target object according to an embodiment of the present disclosure.
FIG. 3 illustrates a flow diagram of a method for sending the selected at least one verification task to an associated computing device of a target object, in accordance with an embodiment of the present disclosure.
Fig. 4 shows a flowchart of a method of browsing a website through a browser built in a predetermined application to obtain data for at least one authentication task according to an embodiment of the present disclosure.
FIG. 5 shows a flow diagram of a method for authenticating a website according to an embodiment of the present disclosure.
FIG. 6 shows a schematic diagram of a web page with page data including structured data, according to an embodiment of the disclosure.
FIG. 7 schematically illustrates a block diagram of a computing device suitable for use to implement embodiments of the present disclosure.
Detailed Description
Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The term "include" and variations thereof as used herein is meant to be inclusive in an open-ended manner, i.e., "including but not limited to". Unless specifically stated otherwise, the term "or" means "and/or". The term "based on" means "based at least in part on". The terms "one example embodiment" and "one embodiment" mean "at least one example embodiment". The term "another embodiment" means "at least one additional embodiment". The terms "first," "second," and the like may refer to different or the same objects.
As described above, the conventional scheme for authenticating the target object has a tedious and time-consuming authentication process, and the collected digital authentication material is easily tampered in advance.
To address, at least in part, one or more of the above problems, and other potential problems, example embodiments of the present disclosure set forth a method for authenticating a target object. The method includes the steps of sending a verification task to an associated computing device of a target object through a control device, and judging whether received data meet each threshold condition of a plurality of threshold conditions or not based on data received from the associated computing device of the target object and uploaded to a blockchain platform by the target object through a preset application program associated with the control device for storage of at least one verification task, so as to determine whether the at least one verification task is verified successfully. Thus, the method for authenticating a target object provided by the present disclosure allows an organization performing authentication to conveniently collect data required for authentication without having to make a field visit to the target object. Meanwhile, the data directly collected by the data pass through a preset application program associated with the control equipment and are verified by utilizing a plurality of threshold conditions, and the data meeting the threshold conditions are uploaded to the block chain platform for storage, so that the possibility that the data are counterfeited or tampered in the verification process and after verification is reduced, the authenticity of the collected digital verification material is ensured, and the accuracy of the target object verification result is improved. Therefore, the method and the device can obviously improve the convenience and efficiency of the verification process, effectively avoid the collected digital verification material from being tampered in advance, and reduce the possibility that the target object makes a fake to the digital verification material.
Fig. 1 shows a schematic diagram of a system 100 for a method of authenticating a target object according to an embodiment of the present disclosure. As shown in fig. 1, system 100 may include a control device 110, an associated computing device 120, and a cloud storage platform 130. The control device 110, the associated computing device 120, and the blockchain platform 130 may interact with data via a network 140 (e.g., the internet).
As for the control device 110, it may be a computing device that executes a subject such as a user or a business awaiting authentication, for example, a mobile terminal of a bank customer manager. The control device 110 may generate a verification task list based on the determined verification task attributes; randomly selecting at least one verification task from the list of verification tasks and sending the selected at least one verification task to the computing device 120 associated with the target object; receiving data for at least one verification task from the target object's associated computing device 120 and determining whether the received data satisfies each of a plurality of threshold conditions; and determining whether the at least one verification task was verified successfully.
With respect to the associated computing device 120, it may be, for example, a computing device of a user or business to be authenticated, such as a mobile terminal of a corporate legal entity applying for a business loan. The associated computing device 120 may collect data through a predetermined application running thereon and upload the collected data to the cloud storage platform 130 for storage. The association computing device 120 may also send the collected data directly to the control device 110 for verification.
With respect to cloud storage platform 130, it is, for example, a blockchain platform. Since the blockchain has the property of being non-falsifiable, by having the target object upload the collected data directly to the blockchain platform, it can be ensured that any original data cannot be falsified during the whole collection process. Also, the blockchain may take the form of an alliance chain, and thus other entities (e.g., a title exchange, an intellectual property office, a court, a notary, an arbitration mechanism, a certification center, etc.) than the current entity (e.g., a bank) of the control device 110 may be added as nodes.
A method 200 for authenticating a target object is described below in conjunction with fig. 2-5. Fig. 2 shows a flow diagram of a method 200 for authenticating a target object according to an embodiment of the present disclosure. The method 200 may be performed by an electronic device 700 as shown in fig. 7. It should be understood that method 200 may also include additional acts not shown and/or may omit acts shown, as the scope of the disclosure is not limited in this respect.
At step 202, at the control device, verification task attributes for the target object are determined.
As regards the target object, it is, for example, a user or a business to be authenticated.
As regards the control device, it is, for example, a computing device executing the subject to be checked, for example, a mobile terminal of a bank customer manager.
With respect to the validation task attributes, which are used to indicate the type of validation task, for example, validation task attributes include, but are not limited to: due diligence of personal loans, high-tech enterprise authentication, transaction-related due diligence, forensic investigation, etc., which are not limited by the present disclosure.
For example, taking as an example that a financial services institution (such as a bank) needs to perform a due diligence survey on a business applying for a loan, in some embodiments, at a control device (e.g., a mobile terminal of a bank customer manager), an authentication task attribute for the business is determined to be a due diligence survey for the business loan.
In step 204, the control device generates a verification task list based on the determined verification task attributes. For example, in the example above, when the verification task attribute for a business is determined to be due diligence for business loans, a verification task list corresponding to the due diligence for business loans is generated.
As to the manner of generating the verification task list, it includes, for example: the control device selects a verification task list corresponding to the current verification task attribute from a plurality of pre-stored verification task lists corresponding to different verification task attributes, wherein each verification task list comprises a plurality of one or more verification tasks related to the corresponding verification task attribute. In some embodiments, the control device may further select one or more verification tasks from a plurality of common verification tasks that are pre-stored to generate a personalized verification task list in a manual manner according to the determined verification task attributes. In some other embodiments, additional authentication tasks may be added manually based on the automatically generated list of authentication tasks, which may be included in pre-stored generic authentication tasks or may be entered manually, without limitation.
With regard to the verification task, it includes, for example: providing a copy of a business license, providing a photo of a place of business, providing a bank flow for issuing salaries, providing a water and electricity fee payment certificate, and the like.
At step 206, the control device randomly selects at least one verification task from the list of verification tasks and sends the selected at least one verification task to the associated computing device of the target object.
Regarding selecting at least one verification task, it includes, for example: the control device selects the verification tasks from the list of verification tasks randomly via the system setup, and may also select one or more verification tasks from the generated list of verification tasks by, for example, a bank worker (such as a customer manager) depending on the specifics of the target object. In some embodiments, the selected at least one verification task may be sent to the target object's associated computing device, either entirely or individually, at any point in time within a predetermined period of time.
With respect to a method for sending the selected at least one verification task to an associated computing device of the target object, this includes, for example: the control equipment randomly selects a plurality of verification tasks from the verification task list; setting a time period to transmit the selected plurality of authentication tasks; sending the selected plurality of verification tasks to the target object at any point in time within the period of time. The above method will be further described with reference to fig. 3, and will not be described herein again.
Further, in step 206, the selected at least one verification task indicates that data for the at least one verification task is to be uploaded to the blockchain platform for storage by a predetermined application program executed by the associated computing device via the associated computing device of the target object. The data for at least one verification task includes image information, video information, and/or geographic location information of the surrounding environment at the time the verification task was performed by the target object obtained by the associated computing device on which the predetermined application was running. As an example, when the verification task sent to the target object is to provide a photo of the business, the target object is required to directly take the photo of the business through an associated computing device (e.g., a mobile phone) on which the predetermined application program runs, and the related photo cannot be read from the local storage, and the taken photo is then directly uploaded to the blockchain platform through the running predetermined application program for storage, so that data provided by the target object is prevented from being counterfeited or tampered in the process of evidence obtaining and evidence storing, and the authenticity of the data is ensured. The data for the at least one verification task may further include, for example, data information, page screenshot information, and/or a timestamp acquired by the target object browsing a website through a browser built in the predetermined application according to the verification task. The data information, the page screenshot information, and/or the timestamp that are obtained by the target object browsing the website through the browser built in the predetermined application according to the verification task will be further described with reference to fig. 4, and will not be described herein again.
In addition, at step 206, a predetermined application program run by the computing device associated with the target object is associated with the control device. That is, the control device may enable receiving data for at least one verification task from the target object's associated computing device at step 208 by reading from the blockchain platform any data uploaded onto the blockchain platform via a predetermined application run by the target object's associated computing device. Alternatively, while the predetermined application uploads the data for the validation tasks to the blockchain platform for storage, a copy of the uploaded data for the validation tasks is sent directly to the control device so that the data for at least one validation task can be received directly from the associated computing device of the target object.
In response to receiving data for the at least one verification task from the associated computing device of the target object, at step 210, the control device determines whether the received data satisfies each of a plurality of threshold conditions, the plurality of threshold conditions including at least that the data for the at least one verification task is uploaded to the blockchain platform for storage within a threshold time.
The plurality of threshold conditions includes at least that data for at least one verification task is collected via its associated computing device within a threshold time, i.e. the target object needs to collect data for at least one verification task via its associated computing device within a threshold time since receiving the at least one verification task. For example, in the example described above where the verification task is to provide a picture of a business, the plurality of threshold conditions includes at least, for example, that data for the verification task (i.e., the picture of the business taken) needs to be collected via the associated computing device of the target object (e.g., the cell phone of the corporate of the enterprise to be verified) within, for example, 20 minutes.
With respect to the plurality of threshold conditions, it may also include, for example, that the geographic location information of the target object when performing the at least one verification task does not exceed the threshold area range, and/or that data for the at least one verification task is data that is not stored by the associated computing device of the target object. According to the embodiments of the present disclosure, the plurality of threshold conditions that need to be satisfied may be different for different data of different verification tasks.
As described above, by defining that data for an authentication task is collected via the target object's associated computing device within a threshold time, and/or defining a threshold area range of a geographic location where the authentication task is performed, and/or defining that uploaded data for the authentication task cannot be data stored via the target object's associated computing device, the target object may be prevented from counterfeiting the data for the authentication task, thereby ensuring authenticity of data submitted by the target object, thereby increasing accuracy of authentication results.
In response to determining at step 210 that the received data for the at least one validation task satisfies each of a plurality of threshold conditions, at step 212, the control device determines that the at least one validation task validation was successful. Conversely, in response to determining at step 210 that the received data for the at least one validation task does not satisfy each of the plurality of threshold conditions, at step 214, the control device generates a prompt for at least one validation task validation failure.
In connection with determining that the received data for the at least one validation task satisfies each of a plurality of threshold conditions, it requires that the data for the at least one validation task satisfy all of the threshold conditions. For example, when multiple data are received for at least one verification task, each of the multiple data is required to satisfy all of the threshold conditions corresponding thereto. Accordingly, with respect to each of the plurality of threshold conditions not being satisfied by the received data for the at least one validation task, this may include, for example, receiving that at least one of the plurality of data does not satisfy all of the threshold conditions corresponding thereto for the at least one validation task.
As shown in fig. 2, after the verification of the at least one verification task fails and the at least one verification task verification failure prompt is generated, the control device may return to step 206, and re-select the at least one verification task from the verification task list at random, and send the re-selected at least one verification task to the associated computing device of the target object, so as to re-verify the target object.
With respect to re-randomly selecting at least one verification task from the list of verification tasks, in some embodiments, the at least one verification task re-selected from the list of verification tasks may include a previously selected at least one verification task, e.g., both the currently selected at least one verification task and the previously selected verification task include providing a photograph of the premises. In this case, the method 200 of fig. 2 may further include (not shown): the control equipment confirms whether the currently selected at least one verification task is the same as the previously selected verification task or not; in response to determining that the currently selected at least one verification task is the same as the previously selected verification task, comparing the received data for the currently selected verification task with the data for the previously selected same verification task; if the difference between the data for the currently selected validation task and the data for the same previously selected validation task is outside of a threshold range, generating at least one indication that the validation task failed.
Regarding comparing the received data for the currently selected authentication task with the data for the same previously selected authentication task to determine whether the difference therebetween is outside a threshold range, it may include, for example, for the same target object, comparing (such as image feature comparison, object recognition, etc.) a photograph of the business received for the currently selected at least one authentication task with a photograph of the business received for the same previously selected authentication task to determine whether the difference between the two photographs is within a threshold range. In this example, if there is a significant difference between the two photographs, such as a scene within the venue is completely different, it is determined that the difference between the two photographs is outside of a threshold range and a prompt is generated that at least one verification task failed verification. In yet another example, for a verification task that requires a provision of a proof of a water and electricity fee payment, if the power usage in data information received twice in succession from the same target object is significantly different, for example, the power usage at 2022 year 3 month in the previously received data is 368 kilowatt hours, and the power usage at 2022 year 3 month in the currently received data is 294 kilowatt hours, it may be determined that the difference between the data for the currently selected verification task and the data for the same previously selected verification task is outside a threshold range, and at least one prompt for verification task failure may be generated.
In some other embodiments, the received data for a currently selected validation task may also be compared to the received historical data for the same validation task to determine if the difference between the two is outside of a threshold range, which may include, for example, comparing data received from a current target object for a validation task to the historical data received from the current target object for the same validation task to determine if the difference between the currently received data and the historical data is outside of a threshold range.
As an example, assuming that the currently selected verification task is to provide water payment of approximately 6 months, the received water payment data for the currently selected verification task (e.g., water payment data of 5 months at 2022 to 10 months at 2022) is compared with historical data previously received from the same target object for the same verification task, where the historical data may include water payment data of approximately 6 months received from the target object at different previous times (e.g., water payment data of 1 month at 2022 to 6 months at 2022, water payment data of 5 months at 2021 to 10 months at 2021, etc.). Compared with historical data, if the mean value of the currently received water fee payment data of the last 6 months is far more than or far lower than the mean value calculated in the historical data, the difference between the received data and the historical data can be determined to be beyond the threshold range, and the verification fails for the currently selected verification task.
Alternatively, the received data for the currently selected validation task may also be compared with historical data received for previously selected related validation tasks. For example, if the currently selected validation task is to provide the last month of water payment and the previously selected related validation task is to provide the last year of water payment, the last month of water payment data received for the currently selected validation task may be compared with the mean of the last year of tax payment data received for the previously selected related validation task, and if there is a significant deviation between the received last month of water payment data and the mean of the previously received last year of tax payment data, it may be determined that the difference between the received data and the historical data exceeds the threshold range, and the validation fails for the currently selected validation task.
The method 200 of fig. 2 may further include (not shown), according to an embodiment of the present disclosure: in response to receiving no data for the at least one verification task from the associated device of the target object within a predetermined period, or in response to re-randomly selecting the at least one verification task from the list of verification tasks within the predetermined period more than a threshold number of times, the control device determines that the target object failed verification.
With respect to the predetermined period, it is, for example, any suitable length of time from the date when the control device transmits the first verification task to the associated device of the target object, for example, one week, two weeks, one month, or the like.
For example, in some embodiments, the predetermined period may be set to two weeks. The control device determines that the target object has failed in authentication if data for at least one authentication task is not received from the associated device of the target object within two weeks from the date of sending the first authentication task (or, when the control device sends a plurality of authentication tasks to the associated device of the target object and data for each of the plurality of authentication tasks is not received from the associated device of the target object), or the number of times at least one authentication task is randomly selected again from the authentication task list exceeds a threshold number of times (e.g., 3 times) within two weeks.
As described above, the method 200 for verifying the target object shown in fig. 2 enables an organization that is going to perform due diligence or evidence collection, for example, to verify the target object through the control device, can significantly improve the convenience and efficiency of the verification process, reduce the possibility that the target object will falsify the digitized verification material, and thus increase the accuracy of the verification result.
FIG. 3 illustrates a flow diagram of a method 300 of sending the selected at least one verification task to an associated computing device of the target object, in accordance with embodiments of the present disclosure. The method 300 may be performed by an electronic device 700 as shown in fig. 7. It should be understood that method 300 may also include additional acts not shown and/or may omit acts shown, as the scope of the disclosure is not limited in this respect.
In step 302, the control device randomly selects a plurality of authentication tasks from the authentication task list.
As to the random selection of the plurality of verification tasks from the verification task list, it is, for example, to randomly select the first verification task, the second verification task, and the third verification task from the verification task list for verifying the target object.
In step 304, the control device sets a period of time to transmit the selected plurality of verification tasks.
With respect to a period of time, it is, for example, any suitable period of time from the date the control device generates the verification task list, e.g., one day, three working days, one week, etc. It should be understood that the length of the set period of time may be adjusted according to the verification task property or the urgency of verification. For example, the control apparatus may set the first verification task, the second verification task, and the third verification task selected at step 302 to be transmitted to the target object within one week.
At step 306, at any point in time within the set period of time, the control device sends the selected plurality of verification tasks to the target object.
For example, in the above example, the set period of time is one week, the system may send the first, second, and third verification tasks selected at step 302 to the target object at any point in the week. In an embodiment, the first verification task, the second verification task, and the third verification task may be sent to the target object simultaneously at the same time period on the same day of the week (such as nine am on wednesday). In yet another embodiment, the first verification task, the second verification task, and the third verification task may be sent to the target object at different time periods on the same day of the week, for example, the first verification task is sent to the target object at nine am on wednesday, and the second verification task and the third verification task are sent to the target object at two pm and four pm on the same day, respectively. In another embodiment, the first verification task, the second verification task, and the third verification task may also be sent to the target object on different days of the week, for example, on monday, wednesday, thursday, respectively.
As described above, since the plurality of verification tasks are randomly selected from the verification task list so that at least one verification task to be executed by the target object can have various combinations, there is little possibility that the plurality of verification tasks to be executed by the target object are identical for the same verification task attribute. And because the time point of sending the verification task to the target object is not fixed, the possibility of counterfeiting the data aiming at the verification task by the target object is obviously reduced, and the authenticity of the data submitted by the target object is ensured.
Fig. 4 illustrates a flow diagram of a method 400 of browsing a website through a browser built in to a predetermined application to obtain data for at least one authentication task, according to an embodiment of the disclosure. The method 400 may be performed by the electronic device 700 as shown in fig. 7. It should be understood that method 400 may also include additional acts not shown and/or may omit acts shown, as the scope of the disclosure is not limited in this respect.
At step 402, a web page associated with the current verification task to be browsed by the target object is determined.
For example, if the current verification task is to provide the electricity fee payment certification of about 12 months, the webpage associated with the current verification task to be browsed by the target object may be an electricity fee inquiry page of a business hall on the national grid.
In step 404, it is determined whether the website to which the webpage to be browsed belongs to a predetermined data set.
With respect to the predetermined data set, it includes the associated address of the commonly used and verified website for obtaining data for at least one verification task. For example, the predetermined set of data may be programmed into a predetermined application program run by the computing device associated with the target object, whereby the target object may access a desired web page through the predetermined application program to obtain data for the at least one verification task.
For example, according to the embodiments of the present disclosure, the corresponding verification task list generated for different verification task attributes may include basic and same verification tasks, such as providing evidence of electric charge payment, providing transaction flow of banks, enterprise/personal tax records, and the like. The verification tasks can be called as 'atomization' verification tasks, and web pages related to the 'atomization' verification tasks, namely an electricity charge query page of a national grid online business hall, a bank transaction detail query page of a country and related addresses of websites to which a national tax administration tax payment query page belongs, can be stored in advance as a predetermined data set so as to directly call the related addresses of the websites when needed. That is, the predetermined set of data may include the associated addresses of websites such as the national grid, banks in a country, the national tax administration, heaven-eye inspection, human resources, and the social security agency. And if the website to which the webpage to be browsed by the target object belongs is, for example, a national power grid, determining that the website to which the webpage to be browsed by the target object belongs to a preset data set.
If the website to which the webpage to be browsed by the target object belongs to the predetermined data set, the target object may directly retrieve the associated address of the website from the predetermined data set so as to link to the webpage to be browsed in step 406.
For example, in the above example where the website to which the webpage to be browsed by the target object belongs is a national grid, the target object may select the national grid in the predetermined data set directly through a predetermined application program running on its associated computing device to link to the electricity fee inquiry page. The preset data set is used for calling the associated address of the website to directly link to the webpage to be browsed, so that the website with wrong access caused by the wrong website input of the target object can be prevented.
In some cases, if the website to which the web page to be browsed by the target object belongs does not belong to the predetermined data set, then the target object optionally links to the web page to be browsed by entering a website address at step 408.
For example, for the verification task, if the webpage to be browsed by the target object is a historical query page for property payment of a certain cell, and the associated address of the website to which the historical query page for property payment of the cell belongs does not belong to the reservation data set, the target object may manually input a website address through a browser built in a predetermined application program running on its associated computing device to access the property management website of the cell.
According to the embodiment of the present disclosure, in order to guarantee the authenticity of the accessed website, prevent the accessed website from being a fake or counterfeit website, and avoid the target object from intentionally inputting an unauthorized fake or counterfeit website, the authenticity of the website to be accessed may be further verified by a method 500 for verifying a website as shown in fig. 5 below, which will be described in further detail with reference to fig. 5 and will not be described herein again.
After linking to the web page to be browsed via step 406, at step 410, it is determined whether the page data of the web page includes structured data that satisfies a predetermined condition.
With respect to structured data, it generally refers to data that is highly organized and well-formatted. FIG. 6 shows a schematic diagram of a web page with page data including structured data, according to an embodiment of the disclosure. The page data shown in fig. 6 includes power amount data and power rate data every month from 1 month to 9 months, which have an orderly format and are of a data type that can be easily put into a spreadsheet and easily grasped directly from a web page, and thus, belong to structured data.
With respect to determining whether the page data of the web page includes structured data that satisfies the predetermined condition, it is determined directly whether the page data of the web page includes structured data that satisfies the predetermined condition, for example, based on the associated address of the website called from the predetermined data set at step 406. As described above, the web pages associated with the "atomized" verification tasks have been pre-stored as a predetermined set of data. According to an embodiment of the present disclosure, when storing a web page associated with an "atomization" verification task as a predetermined data set, the web pages stored in the predetermined data set may be further divided into a first type web page including structured data and a second type web page not including structured data based on whether the page data of the web page includes the structured data satisfying a predetermined condition, and for the first type web page including the structured data, an associated address of a website to which the web page belongs is pre-stored in the predetermined data set together with a code for parsing a page code of the web page. Thus, at step 410, it may be determined whether the page data of the web page includes structured data based directly on the associated address of the called web site.
At step 412, in response to determining that the page data of the web page includes structured data that satisfies a predetermined condition, the page code of the web page is parsed for data for the current validation task.
Regarding parsing the page code of the web page, it is, for example, to call a code stored for the web page to parse the page code of the web page, so as to locate and capture source data displayed on the web page according to keywords in the page code of the web page.
For example, the page code of the web page shown in fig. 6 may be parsed, and data for the current verification task may be obtained based on source data included in the parsed code and corresponding to related data information displayed on the web page. For example, if the current verification task is to provide a 1-6 month electricity fee payment proof, the page code of the webpage shown in fig. 6 may be parsed, and the 1-6 month electricity fee data may be obtained according to the source data included in the page code and corresponding to the 1-6 month electricity fee data.
Regarding the page data of a web page, it may not include structured data that satisfies a predetermined condition. For example, in some embodiments, the page data of a web page may be presented in the form of a picture or the page data may not have an orderly format. In this case, in response to the page data of the web page not including structured data that satisfies the predetermined condition, instead, at step 414, the running predetermined application may background call an internal screenshot function of the associated computing device of the target object to screenshot the web page to obtain data for the current authentication task.
For the web pages to be browsed linked via step 408, since it cannot be predetermined whether the web pages include structured data meeting the predetermined condition, and therefore, code for parsing the page code of the web pages cannot be written in advance, for the collection of the data of the web pages linked via step 408, in step 414, an internal screenshot function of an associated computing device of the target object is called via a predetermined application program running through a background so as to screenshot the web page to obtain data for the current verification task.
As described above, since the internal screenshot function of the associated computing device is directly invoked by the running predetermined application program, it is possible to prevent the later uploaded data from being an image that has been intercepted and tampered in advance, and at the same time, the image obtained by screenshot of the web page is directly uploaded without being stored in the local storage of the associated computing device, thereby further preventing the later uploaded data from being tampered or forged, and ensuring the authenticity of the data.
After data for the current verification task is obtained as described above, the obtained data is uploaded to the blockchain platform for storage, so as to ensure that the stored data is not tampered in the whole life cycle of the stored data by utilizing the characteristic that the blockchain is not tampered.
Optionally, in step 416, the data for the current verification task obtained in step 412 or in step 414 is signed and encrypted, according to some embodiments of the present disclosure.
Regarding signing and adding to data, it may be, for example, bulk encryption of the resulting data for the current authentication task, such as bulk encryption of data using a Data Encryption Standard (DES) algorithm, so that the data is stored in a form of ciphertext on a blockchain platform, thereby ensuring data authenticity while also preserving privacy protection of the data uploaded by the target object.
At step 418, the signed and encrypted data for the current authentication task is uploaded to the blockchain platform for storage along with a timestamp of the data obtained. By uploading the time stamp along with the original data to the blockchain platform, the authenticity of the stored data can be further ensured. In some other embodiments, the positioning information, network messages, etc. when the data is acquired may also be uploaded to the blockchain platform along with the timestamp and the original data. In addition, the uploaded timestamps, positioning information, network messages and the like can also be used for cross validation of stored data, so that the reliability of the data uploaded by the target object is improved, and the accuracy of the target object validation result is improved.
FIG. 5 shows a flow diagram of a method 400 for authenticating a website according to an embodiment of the present disclosure. The method 500 may be performed by the electronic device 700 as shown in fig. 7. It should be understood that method 500 may also include additional acts not shown and/or may omit acts shown, as the scope of the disclosure is not limited in this respect.
As described above, in order to guarantee the authenticity of the accessed website, prevent the accessed website from being a counterfeit or forged website, and prevent the target object from intentionally inputting an unauthenticated counterfeit or forged website, the control device (or a predetermined application associated with the control device) may verify the authenticity of the website to be accessed through the method 500 as shown in fig. 5.
In step 501, the target object determines the website address of the website to be accessed.
With respect to determining the website address of the website to visit, as described above, the target object may select the associated address of the website to visit from a predetermined data set by associating with a predetermined application program running on the computing device, or may enter the website address from a browser built into the predetermined application program.
At step 502, the control device (or a predetermined application associated with the control device) confirms whether the server certificate of the website is authenticated.
With respect to whether a web site's server certificate is authenticated, access to the web site may be proven to be secure, typically if the web site has a digital certificate issued by an authority, for example. Thus, if the web site has an SSL certificate issued by a trusted digital certificate authority, CA, the server certificate of the web site is validated. Therefore, the authenticity of the website can be verified by the SSL certificate, so that the accessed website is guaranteed not to be a fake or forged website. Thus, in response to confirming that the web site's server certificate is validated, the web site is accessed to link to the web page to be browsed at step 504.
If a website does not have a digital certificate (e.g., SSL certificate) issued by an authority or has a digital certificate that is not issued by an authority, there is a possibility of Domain Name (DNS) hijacking for accessing the website through a website, that is, even if the target object is selecting an associated address of the website to be accessed from a predetermined data set or the target object is entering the website address in a browser built in a predetermined application is correct, it may be directed to the wrong website. To avoid this, in step 506, in response to confirming that the website does not have the server certificate or that the server certificate of the website is not verified, a predetermined server associated with the cloud platform is invoked to access the website via the predetermined server to link to the web page to be browsed (step 504), so that the accessed website matches the selected or entered website.
As for the predetermined server, it may be an http dns server. The HTTP DNS server enables DNS resolution of web sites via proprietary HTTP protocols and dedicated servers. For example, a code segment specifying an interface for DNS may be embedded in code associated with a predetermined application running on the computing device to implement step 506. Therefore, DNS analysis is carried out on the website through a proprietary HTTP protocol and a dedicated server, occurrence of DNS hijacking can be avoided, and authenticity of the accessed website is further guaranteed.
FIG. 7 schematically illustrates a block diagram of a computing device 700 suitable for use to implement embodiments of the present disclosure. The apparatus 700 may be an apparatus for implementing the method 200 shown in fig. 2 or the method 300 shown in fig. 3 or the method 400 shown in fig. 4 or the method 500 shown in fig. 5. As shown in fig. 7, device 700 includes a Central Processing Unit (CPU) 701 that may perform various appropriate actions and processes in accordance with computer program instructions stored in a Read Only Memory (ROM) 702 or computer program instructions loaded from a storage unit 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data required for the operation of the device 700 can also be stored. The CPU 701, the ROM702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Various components in the device 700 are connected to the I/O interface 705, including: an input unit 706, an output unit 707, a storage unit 708, a processing unit 701 performs the respective methods and processes described above, for example performing the method 200 or the method 300 or the method 400 or the method 500. For example, in some embodiments, the method 200 or the method 300 or the method 400 or the method 500 may be implemented as a computer software program stored on a machine-readable medium, such as the storage unit 708. In some embodiments, part or all of a computer program may be loaded onto and/or installed onto device 700 via ROM702 and/or communications unit 709. When the computer program is loaded into the RAM 703 and executed by the CPU 701, one or more steps of the method 200 or the method 300 or the method 400 or the method 500 described above may be performed. Alternatively, in other embodiments, the CPU 701 may be configured by any other suitable means (e.g., by way of firmware) to perform one or more steps of the method 200 or 300 or the method 400 or 500.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
These computer-readable program instructions may be provided to a processor in a voice interaction device, a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner.
The foregoing description of the embodiments of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
The above are merely alternative embodiments of the present disclosure and are not intended to limit the present disclosure, which may be modified and varied by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the protection scope of the present disclosure.

Claims (13)

1. A method for authenticating a target object, comprising:
determining, at a control device, a validation task attribute for the target object;
generating a verification task list based on the determined verification task attributes;
randomly selecting at least one verification task from the verification task list, and sending the selected at least one verification task to the associated computing device of the target object, wherein the selected at least one verification task indicates that data for the at least one verification task needs to be uploaded to a blockchain platform for storage through a predetermined application program run by the associated computing device via the associated computing device of the target object, and the predetermined application program is associated with the control device;
in response to receiving data for the at least one verification task from an associated computing device of the target object, determining whether the received data satisfies each of a plurality of threshold conditions; and
determining that the at least one verification task verification is successful in response to the received data satisfying each threshold condition, the plurality of threshold conditions including at least that data for the at least one verification task was collected via the target object's associated computing device within a threshold time.
2. The method of claim 1, further comprising:
in response to the received data not all meeting a threshold condition, generating a prompt that the at least one verification task failed verification; and
and re-randomly selecting at least one verification task from the verification task list, and sending the re-selected at least one verification task to the target object so as to re-verify the target object.
3. The method of claim 2, wherein the data for the at least one verification task comprises at least one of:
image information, video information and/or geographical location information of the surroundings of the target object obtained by the associated computing device running the predetermined application when performing the at least one verification task, and
and the target object browses the website through a browser built in the preset application program according to the at least one verification task to obtain data information, page screenshot information and/or a timestamp.
4. The method of claim 3, wherein the plurality of threshold conditions further comprises:
the geographic location information of the target object during the execution of the at least one verification task does not exceed a threshold area, or
The data for the at least one verification task is data that is not stored by an associated computing device of the target object.
5. The method of claim 1, wherein randomly selecting at least one verification task from the list of verification tasks and sending the selected at least one verification task to an associated computing device of the target object comprises:
randomly selecting a plurality of verification tasks from the verification task list;
setting a time period to transmit the selected plurality of authentication tasks;
sending the selected plurality of verification tasks to the target object at any point in time within the period of time.
6. The method of claim 2, further comprising:
confirming whether the currently selected at least one verification task is the same as the previously selected verification task;
in response to determining that the currently selected at least one verification task is the same as the previously selected verification task, comparing the received data for the currently selected verification task with the data for the previously selected same verification task;
generating a prompt for the at least one verification task to fail verification if the difference between the data for the currently selected verification task and the data for the previously selected same verification task is outside a threshold range.
7. The method of claim 2, further comprising:
determining that the target object fails to verify in response to not receiving data for the at least one verification task from an associated device of the target object for a predetermined period, or a number of times at least one verification task is re-randomly selected from the list of verification tasks for the predetermined period exceeding a threshold number of times.
8. The method of claim 1, further comprising:
determining a webpage associated with a current verification task to be browsed by the target object through a browser built in the preset application program;
determining whether a website to which a webpage to be browsed belongs to a preset data set or not;
in response to determining that the website to which the webpage to be browsed belongs to the preset data set, directly calling the associated address of the website from the preset data set so as to link to the webpage to be browsed;
determining whether the page data of the webpage comprises structured data meeting a preset condition or not based on the called associated address of the website;
in response to determining that the page data of the webpage includes structured data that meets a predetermined condition, directly parsing the page code of the webpage to obtain data for the current validation task; and
and uploading the obtained data to the block chain platform for storage.
9. The method of claim 8, further comprising:
invoking an internal screenshot function of the associated computing device in response to the page data of the web page not including structured data that satisfies the predetermined condition; and
and screenshot is carried out on the webpage so as to upload the screenshot webpage information to the block chain platform for storage.
10. The method of claim 8, further comprising:
confirming whether the server certificate of the website passes verification;
in response to confirming that the website does not have a server certificate or that the server certificate of the website is not verified, invoking a predetermined server associated with a cloud platform, wherein the predetermined server is an HTTP DNS server, so as to access the website via the predetermined server, and the accessed website is matched with the invoked address associated with the website.
11. The method of claim 8, wherein uploading the obtained data to the blockchain platform for storage comprises:
signing and encrypting the data; and
uploading the signed and encrypted data to the blockchain platform for storage along with a timestamp of the data being obtained.
12. An electronic device, comprising:
at least one processing unit;
at least one memory coupled to the at least one processing unit and storing instructions for execution by the at least one processing unit, the instructions when executed by the at least one processing unit, cause the electronic device to perform the steps of the method of any of claims 1-11.
13. A non-transitory computer readable storage medium having stored thereon machine executable instructions which, when executed, cause a machine to perform the steps of the method of any of claims 1-11.
CN202211461678.0A 2022-11-17 2022-11-17 Method, electronic device, and computer storage medium for authenticating target object Pending CN115795561A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211461678.0A CN115795561A (en) 2022-11-17 2022-11-17 Method, electronic device, and computer storage medium for authenticating target object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211461678.0A CN115795561A (en) 2022-11-17 2022-11-17 Method, electronic device, and computer storage medium for authenticating target object

Publications (1)

Publication Number Publication Date
CN115795561A true CN115795561A (en) 2023-03-14

Family

ID=85439763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211461678.0A Pending CN115795561A (en) 2022-11-17 2022-11-17 Method, electronic device, and computer storage medium for authenticating target object

Country Status (1)

Country Link
CN (1) CN115795561A (en)

Similar Documents

Publication Publication Date Title
US10705801B2 (en) Data processing systems for identity validation of data subject access requests and related methods
US11784824B1 (en) Secure ledger assurance tokenization
WO2021000337A1 (en) System and method for mapping decentralized identifiers to real-world entities
US9378345B2 (en) Authentication using device ID
US7971059B2 (en) Secure channel for image transmission
CN111164594A (en) System and method for mapping decentralized identity to real entity
US20070226507A1 (en) Method and System for Depositing Digital Works, A Corresponding Computer Program, and a Corresponding Computer-Readable Storage Medium
CN111444550A (en) Block chain-based service data verification method and device and readable storage medium
US20110208631A1 (en) System and method for mortgage application recording
GB2471072A (en) Electronic document verification system
US11621844B2 (en) Secure data transfer system and method
CN110990883A (en) Data access method, data access device, computer-readable storage medium and computer equipment
US20190139133A1 (en) System for periodically updating backings for resource requests
JP5645674B2 (en) Digital contract system
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN111488372A (en) Data processing method, device and storage medium
US20150213551A1 (en) Method, system, service, and computer program product for verification and delivery of income tax return information
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN114303129A (en) Document authentication method and system
US10013237B2 (en) Automated approval
US20210217100A1 (en) Storage management based on message feedback
CN111211902A (en) Digital signature method and device based on enterprise browser
JP5958544B2 (en) Information processing system, information processing method, program
CN115795561A (en) Method, electronic device, and computer storage medium for authenticating target object
CN109413200A (en) A kind of method, client, MES and electronic equipment that resource imports

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination