CN115834148A - Identity security verification method and device - Google Patents

Identity security verification method and device Download PDF

Info

Publication number
CN115834148A
CN115834148A CN202211376455.4A CN202211376455A CN115834148A CN 115834148 A CN115834148 A CN 115834148A CN 202211376455 A CN202211376455 A CN 202211376455A CN 115834148 A CN115834148 A CN 115834148A
Authority
CN
China
Prior art keywords
short message
verification code
message verification
initiator
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211376455.4A
Other languages
Chinese (zh)
Inventor
梁庆
陈芳琳
李严桵
谢铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202211376455.4A priority Critical patent/CN115834148A/en
Publication of CN115834148A publication Critical patent/CN115834148A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an identity security verification method and device, wherein the method comprises the following steps: generating a first short message verification code according to a service request and feeding back the first short message verification code to an initiator of the service request; receiving a second short message verification code fed back by the initiator according to the first short message verification code; analyzing the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code; and comparing the third short message verification code with the first short message verification code to obtain a first verification result. Based on the existing short message verification mechanism, when the third short message verification code is consistent with the first short message verification code, the encryption rule of the second short message verification code is verified to be consistent with the encryption rule preset by the initiator, so that the operator of the initiator is verified to be the authorized user.

Description

Identity security verification method and device
Technical Field
The invention relates to the technical field of network security, in particular to an identity security verification method and device.
Background
This section is intended to provide a background or context to the embodiments of the invention that are recited in the claims. The description herein is not admitted to be prior art by inclusion in this section.
Short message authentication is a certificate given to a consumer (user) by an enterprise, and the identity is verified through a short message authentication code. The most common use is online banking of various large banks, mobile phone applications, online shopping malls and the like. The identity of the user is verified by using the short message verification code, which is essentially to verify the mobile phone number reserved by the user, that is, only the mobile phone number reserved by the user can receive the short message verification code, but in some cases in the actual use process, an operator is not an authorized user, and the operation process is not authorized by the authorized user, so that the existing method for verifying the identity security through the short message verification code cannot protect the operation process. For example, when a child takes a parent's mobile phone to play, and operates some application sensitive functions, such as a transfer function, the short message verification code used for identity security verification cannot play an effective role.
Disclosure of Invention
The embodiment of the invention provides an identity security verification method, which is used for solving the technical problem that whether an operator is an authorized user cannot be verified when identity installation verification is carried out through a short message verification code at present, and comprises the following steps:
generating a first short message verification code according to a service request of an initiator and feeding back the first short message verification code to the initiator of the service request;
receiving a second short message verification code fed back by the initiator according to the first short message verification code;
analyzing the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code;
and comparing the third short message verification code with the first short message verification code, and obtaining a verification result.
The embodiment of the invention also provides an identity security verification device, which is used for solving the technical problem that whether an operator is an authorized user cannot be verified when identity installation verification is carried out through a short message verification code at present, and the device comprises:
the short message verification code generating module is used for generating a first short message verification code according to a service request of an initiator and feeding the first short message verification code back to the initiator of the service request;
the verification code feedback module is used for receiving a second short message verification code fed back by the initiator according to the first short message verification code;
the analysis module is used for analyzing the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code;
and the comparison module is used for comparing the third short message verification code with the first short message verification code and obtaining a verification result.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the identity security verification method is realized when the processor executes the computer program.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and the computer program is executed by a processor to realize the identity security verification method.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when the computer program is executed by a processor, the identity security authentication method is implemented.
Compared with the prior art, the identity security verification method and the identity security verification device in the embodiment of the invention are based on the existing short message verification mechanism, the third short message verification code is obtained by analyzing the second short message code provided by the initiator according to the encryption rule preset by the initiator, and the third short message verification code is compared with the first short message verification code, when the third short message verification code is consistent with the first short message verification code, the encryption rule of the second short message verification code is verified to be consistent with the encryption rule preset by the initiator, so that the operator of the initiator is verified to be an authorized user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. In the drawings:
FIG. 1 is a schematic flow chart of a method for verifying identity security according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating a process of parsing a second short message verification code to obtain a third short message verification code according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a process of obtaining a user identity confirmation result of the initiator according to the embodiment of the present invention;
fig. 4 is a schematic flow chart of early warning in the embodiment of the present invention.
Fig. 5 is a schematic structural diagram of an identity security verification apparatus according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of an analysis module in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention are further described in detail below with reference to the accompanying drawings. The exemplary embodiments and descriptions of the present invention are provided to explain the present invention, but not to limit the present invention.
As shown in fig. 1, an embodiment of the present invention provides an identity security verification method, including:
step 101, generating a first short message verification code according to a service request of an initiator and feeding back the first short message verification code to the initiator of the service request.
The service request may be a financial service request, such as a transfer, a query, etc., or may be other service requests, such as login, identity information change, etc. The service request is triggered by an operator of the initiator, which may be an authorized user or an unauthorized user.
And 102, receiving a second short message verification code fed back by the initiator according to the first short message verification code.
And the operator of the initiator submits a second short message verification code according to the first short message verification code. When the operator of the initiator authorizes the user, the first short message verification code is encrypted according to a preset encryption rule, and the submitted second short message verification code is different from the first short message verification code. When the operator of the initiator is an unauthorized user, the first short message authentication code is not encrypted because the preset encryption rule cannot be known, or the first short message authentication code is encrypted by adopting other encryption rules, and the submitted second short message authentication code may be the same as or different from the first short message authentication code.
And 103, analyzing the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code.
If the second short message verification code is submitted after the authorized user is encrypted through a preset encryption rule, the third short message verification obtained after analysis is the same as the first short message verification code. And if the second short message verification code is submitted after the unauthorized user is not encrypted by a preset encryption rule, the third short message verification obtained after analysis is different from the first short message verification code.
And step 104, comparing the third short message verification code with the first short message verification code, and obtaining a verification result.
The third short message verification code is consistent with the first short message verification code, the verification result is correct, the fact that an operator of the initiator authorizes the user is indicated, and the system normally provides corresponding services for the initiator; if the two are not consistent, the verification result is wrong, the fact that the operator of the initiator is an unauthorized user is indicated, and the system cannot normally provide corresponding services for the initiator.
As shown in fig. 2, in the above embodiment, the analyzing the second short message verification code according to the encryption rule preset by the initiator to obtain a third short message verification code includes:
step 201, extracting characters at corresponding positions in the second short message verification code according to the encryption positions of the encryption rules to generate a first character string;
step 202, performing inverse operation on the first character string according to the encryption algorithm of the encryption rule to obtain a second character string;
and 203, replacing the characters in the second character string with the characters at the corresponding position of the second short message verification code to obtain the third short message verification code.
Specifically, the encryption position refers to an encrypted character position, for example, a first digit character of the first short message verification code is encrypted, a second digit character and a third digit character of the first short message verification code are encrypted, and the like. The encryption algorithm includes, but is not limited to, a combination of one or more of a number operation, a transposition operation, and an insertion operation. The digital operation includes, but is not limited to, one or more of adding a preset parameter, subtracting the preset parameter, multiplying the preset parameter, and dividing the preset parameter by the preset parameter.
For example, the first short message verification code is "1234". If the second short message verification code is 1235 and the encryption position is 4 th, extracting a 4 th character 5 to generate a first character string 5; performing inverse operation '-1' on the first character string '5' according to a preset encryption rule '+ 1' to obtain a second character string '4'; replacing a 4 th-bit character '5' in the second short message verification code '1235' with the second character string '4' to obtain a third short message verification code '1234'; therefore, the third short message verification code is consistent with the first short message verification code, and the verification is passed. If the second short message verification code is 1234 ' and the encryption position is 4 th, extracting a 4 th character ' 4 ', thereby generating a first character string ' 4 '; performing inverse operation '-1' on the first character string '4' according to a preset encryption rule '+ 1' to obtain a second character string '3'; replacing the 4 th character '4' in the second short message verification code '1234' with the second character string '3', and obtaining a third short message verification code '1233'; therefore, the third short message verification code is inconsistent with the first short message verification code, and the verification is not passed.
For another example, the first short message verification code is "1234". If the second short message verification code is '2134', the encryption positions are the 1 st bit and the 2 nd bit, extracting the 1 st bit character '2' and the 2 nd bit character '1', and generating a first character string '21'; according to a preset encryption rule, performing inverse processing on the two characters to replace the two characters, and replacing the two characters again to obtain a second character string 12; replacing the 1 st bit character "2" and the 2 nd bit character "1" in the second short message verification code "2134" with the character "1" and the character "2" in the second character string "12" to obtain a third short message verification code "1234"; therefore, the third short message verification code is consistent with the first short message verification code, and the verification is passed. If the second short message verification code is 1234, the encryption positions are the 1 st bit and the 2 nd bit, and the 1 st bit character 1 and the 2 nd bit character 2 are extracted, so that a first character string 12 is generated; according to a preset encryption rule, carrying out reverse processing on the two characters to convert the two characters again to obtain a second character string 21; replacing the 1 st character "1" and the 2 nd character "2" in the second short message verification code "1234" with the character "2" and the character "1" in the second character string "21", and obtaining a third short message verification code "2134"; therefore, the third short message verification code is inconsistent with the first short message verification code, and the verification fails.
As shown in fig. 3, when the initiator has a plurality of authorized users and establishes corresponding encryption rules respectively, the verification result only indicates that the operator of the initiator is an authorized user, but cannot know which authorized user, and therefore, in the above embodiment, the method further includes:
step 301, generating an encryption rule of the second short message verification code according to the first short message verification code and the second short message verification code. And the encryption rule of the second short message verification code is a rule for processing the first short message verification code to obtain the second short message verification code.
And 302, matching the encryption rule of the second short message verification code with a plurality of encryption rules preset by the initiator to obtain a user identity confirmation result of the initiator.
For example, the initiator has a first authorized user, a second authorized user, and a third authorized user, and the preset encryption rules are "1 st bit character +2", "4 th bit character-2", and "4 th bit character +2", respectively. According to the condition that the first short message verification code is 1234 and the second short message verification code is 1236, obtaining the encryption rule of the second short message verification code as 4 th bit character + 2; and matching the encryption rule '4 th bit character + 2' of the second short message verification code with a plurality of encryption rules '1 st bit character + 2', '4 th bit character-2' and '4 th bit character + 2' preset by the initiator to obtain a user identity confirmation result of the initiator as a third authorized user.
In an embodiment, the step 103 is performed after the step 302, and when the encryption rule of the second short message verification code matches with only one encryption rule preset by the initiator, the step 103 analyzes the second short message verification code according to the matching encryption rule to obtain a third short message verification code. When the encryption rule of the second short message verification code is inconsistent with the plurality of encryption rules preset by the initiator, in step 103, the second short message verification code is analyzed according to any encryption rule to obtain a third short message verification code.
In another embodiment, the step 103 is performed synchronously with the step 301. In another embodiment, the step 301 is executed after the verification result in the step 104 passes, and the step 301 is not executed if the verification result does not pass. In the two embodiments, step 103, the second short message verification code is analyzed according to a plurality of preset encryption rules to obtain a plurality of third short message verification codes; and 104, comparing the plurality of third short message verification codes with the first short message verification code, wherein if one third short message verification code is consistent with the first short message verification code, the verification is passed, and if the third short message verification code is inconsistent with the first short message verification code, the verification is not passed.
As shown in fig. 4, when the operator of the initiator is not an authorized user, there is a high security risk on behalf of the initiator, such as the authorized user is at risk of being coerced, stolen, and so on, and therefore in order to improve security, in the above embodiment, after obtaining the verification result, the method further includes:
step 401, determining whether the number of times of error of the verification result exceeds a preset number of times. The preset number of times may be set to 3 times, 5 times or other times. When the verification result is wrong, the operator of the initiator is not the authorized user or the operation of the authorized user is wrong, but when the verification result is wrong for multiple times, the possibility that the operator of the initiator is not the authorized user is very high, and the intervention can be carried out.
Step 402, if yes, obtaining the position information, the image information and the identity information of the initiator. The position information of the initiator is real-time position information which is acquired by an operator and is obtained when the initiator submits a second short message verification code. The image information is an image of the operator shot by starting the camera of the initiator. The identity information is information of an authorized user of the initiator.
And 403, generating an early warning prompt according to the identity information, the position information and the image information, and sending the early warning prompt to an emergency contact party of the initiator. Specifically, the emergency contact party may be a contact address of an emergency contact person preset by an authorized user of the initiator, or may be a public security organization.
In the above embodiment, after the step 102 and before the step 103, the method includes: judging whether the initiator is in an encryption state or not; if so, calling a corresponding encryption rule; if not, comparing the second short message verification code with the first short message verification code, and obtaining a verification result.
Specifically, when the initiator does not preset the encryption rule or preset the encryption rule but is disabled, the initiator is in an unencrypted state, compares the second short message verification code with the first short message verification code, and obtains a verification result, without performing the steps 103 and 104. When the encryption rule is preset and enabled by the initiator, the initiator is in an encryption state, and the step 103 is executed after the corresponding encryption rule is called.
In order to facilitate the authorized user to change the encryption rule through the initiator, in the above embodiment, the method further includes: receiving a request of the initiator to change encryption rules. After receiving a request of an initiator for changing encryption rules, carrying out identity security verification on the initiator based on the current encryption rules, and providing a plurality of encryption rules for the initiator after the verification result passes; and generating the encryption rule according to the selection of the initiator.
Specifically, the plurality of encryption rules include a selection of a plurality of encryption positions and a selection of a plurality of encryption algorithms. And generating an encryption rule according to the encryption position and the encryption algorithm selected by the initiator. And when the encryption request is a first encryption request, carrying out identity security verification on the initiator by using the existing identity security verification method, and providing a plurality of encryption rules for the initiator after the verification result passes.
In order to facilitate the authorized user to deactivate the encryption rules through the initiator, in the above embodiment, the method further includes: receiving a stop encryption request of the initiator. After receiving an encryption stopping request of an initiator, carrying out identity security verification on the initiator based on a current encryption rule, and changing the encryption state of the initiator into an unencrypted state after the verification result passes.
As shown in fig. 5, an identity security verification apparatus is further provided in the embodiment of the present invention, as described in the following embodiments. Because the principle of the device for solving the problems is similar to that of the identity security verification method, the implementation of the device can refer to the implementation of the identity security verification method, and repeated parts are not described again.
As shown in fig. 5, the identity security verification apparatus according to the embodiment of the present invention includes: a short message verification code generating module 501, configured to generate a first short message verification code according to a service request of an initiator and feed back the first short message verification code to the initiator of the service request; a verification code feedback module 502, configured to receive a second short message verification code fed back by the initiator according to the first short message verification code; the analysis module 503 is configured to analyze the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code; a comparison module 504, configured to compare the third short message verification code with the first short message verification code, and obtain a verification result.
As shown in fig. 6, in the embodiment of the present invention, the identity security verification apparatus further includes: the parsing module 503 includes: an extracting unit 601, configured to extract, according to an encryption position of the encryption rule, a character at a corresponding position in the second short message verification code, and generate a first character string; an inverse operation unit 602, configured to perform an inverse operation on the first character string according to an encryption algorithm of the encryption rule, to obtain a second character string; a replacing unit 603, configured to replace a character in the second character string with a character at a corresponding position of the second short message verification code, so as to obtain the third short message verification code.
As shown in fig. 5, in the embodiment of the present invention, the number of the preset encryption rules is multiple, and the identity security verification apparatus further includes: an encryption rule generating module 505, configured to generate an encryption rule of the second short message verification code according to the first short message verification code and the second short message verification code; a matching module 506, configured to match the encryption rule of the second short message verification code with multiple encryption rules preset by the initiator, so as to obtain a user identity confirmation result of the initiator.
As shown in fig. 5, in the embodiment of the present invention, the determination module 507 of the identity security verification apparatus is configured to determine whether the number of times of error in the verification result exceeds a preset number of times; an information obtaining module 508, configured to obtain location information, image information, and identity information of the initiator; and an early warning module 509, configured to generate an early warning prompt according to the identity information, the location information, and the image information, and send the early warning prompt to an emergency contact party of the initiator.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the identity security verification method is realized when the processor executes the computer program.
The embodiment of the invention also provides a computer readable storage medium, which stores a computer program, and the computer program is executed by a processor to realize the identity security verification method.
An embodiment of the present invention further provides a computer program product, where the computer program product includes a computer program, and when the computer program is executed by a processor, the identity security authentication method is implemented.
Compared with the prior art, the identity security verification method and the identity security verification device in the embodiment of the invention are based on the existing short message verification mechanism, the third short message verification code is obtained by analyzing the second short message code provided by the initiator according to the encryption rule preset by the initiator, and the third short message verification code is compared with the first short message verification code, when the third short message verification code is consistent with the first short message verification code, the encryption rule of the second short message verification code is verified to be consistent with the encryption rule preset by the initiator, so that the operator of the initiator is verified to be an authorized user.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above-mentioned embodiments are provided to further explain the objects, technical solutions and advantages of the present invention in detail, and it should be understood that the above-mentioned embodiments are only examples of the present invention and should not be used to limit the scope of the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (11)

1. An identity security verification method, comprising:
generating a first short message verification code according to a service request of an initiator and feeding back the first short message verification code to the initiator of the service request;
receiving a second short message verification code fed back by the initiator according to the first short message verification code;
analyzing the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code;
and comparing the third short message verification code with the first short message verification code, and obtaining a verification result.
2. The identity security verification method of claim 1, wherein the analyzing the second short message verification code according to the encryption rule preset by the initiator to obtain a third short message verification code comprises:
extracting characters at corresponding positions in the second short message verification code according to the encryption positions of the encryption rules to generate a first character string;
performing inverse operation on the first character string according to the encryption algorithm of the encryption rule to obtain a second character string;
and replacing the characters in the second character string with the characters at the corresponding position of the second short message verification code to obtain the third short message verification code.
3. The identity security verification method of claim 1, wherein the preset encryption rules are plural, further comprising:
generating an encryption rule of the second short message verification code according to the first short message verification code and the second short message verification code;
and matching the encryption rule of the second short message verification code with a plurality of encryption rules preset by the initiator to obtain a user identity confirmation result of the initiator.
4. The identity security authentication method of claim 1, after obtaining the authentication result, further comprising:
judging whether the error frequency of the verification result exceeds a preset frequency or not;
if so, acquiring the position information, the image information and the identity information of the initiator;
and generating an early warning prompt according to the identity information, the position information and the image information, and sending the early warning prompt to an emergency contact party of the initiator.
5. An identity security verification apparatus, comprising:
the short message verification code generating module is used for generating a first short message verification code according to a service request of an initiator and feeding the first short message verification code back to the initiator of the service request;
the verification code feedback module is used for receiving a second short message verification code fed back by the initiator according to the first short message verification code;
the analysis module is used for analyzing the second short message verification code according to an encryption rule preset by the initiator to obtain a third short message verification code;
and the comparison module is used for comparing the third short message verification code with the first short message verification code and obtaining a verification result.
6. The identity security verification apparatus of claim 5, wherein the parsing module comprises:
the extraction unit is used for extracting characters at corresponding positions in the second short message verification code according to the encryption positions of the encryption rules to generate a first character string;
the inverse operation unit is used for carrying out inverse operation on the first character string according to the encryption algorithm of the encryption rule to obtain a second character string;
and the replacing unit is used for replacing the characters in the second character string with the characters at the corresponding position of the second short message verification code to obtain the third short message verification code.
7. The identity security verification apparatus according to claim 5, wherein the predetermined encryption rule is plural, further comprising:
the encryption rule generating module is used for generating an encryption rule of the second short message verification code according to the first short message verification code and the second short message verification code;
and the matching module is used for matching the encryption rule of the second short message verification code with a plurality of encryption rules preset by the initiator to obtain a user identity confirmation result of the initiator.
8. The identity security verification apparatus of claim 5, further comprising:
the judging module is used for judging whether the error frequency of the verification result exceeds a preset frequency;
the information acquisition module is used for acquiring the position information, the image information and the identity information of the initiator;
and the early warning module is used for generating an early warning prompt according to the identity information, the position information and the image information and sending the early warning prompt to the emergency contact party of the initiator.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method of any of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, implements the method of any of claims 1 to 4.
11. A computer program product, characterized in that the computer program product comprises a computer program which, when being executed by a processor, carries out the method of any one of claims 1 to 4.
CN202211376455.4A 2022-11-04 2022-11-04 Identity security verification method and device Pending CN115834148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211376455.4A CN115834148A (en) 2022-11-04 2022-11-04 Identity security verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211376455.4A CN115834148A (en) 2022-11-04 2022-11-04 Identity security verification method and device

Publications (1)

Publication Number Publication Date
CN115834148A true CN115834148A (en) 2023-03-21

Family

ID=85526622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211376455.4A Pending CN115834148A (en) 2022-11-04 2022-11-04 Identity security verification method and device

Country Status (1)

Country Link
CN (1) CN115834148A (en)

Similar Documents

Publication Publication Date Title
US10587604B2 (en) Device verification method and apparatus
KR102115641B1 (en) Method and apparatus of verifying usability of biological characteristic image
CN108073821B (en) Data security processing method and device
CN110740128B (en) Offline data encryption method and device
CN103942896A (en) System for money withdrawing without card on ATM
CN113472716B (en) System access method, gateway device, server, electronic device and storage medium
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
CN110598421B (en) Two-dimensional code encryption method and device and two-dimensional code decryption method and device
CN112769789B (en) Encryption communication method and system
CN111709835B (en) Service processing method and system
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN107623679B (en) Data marking processing method and device and storage medium
CN110535809B (en) Identification code pulling method, storage medium, terminal device and server
CN112149068A (en) Access-based authorization verification method, information generation method and device, and server
CN115834148A (en) Identity security verification method and device
CN114245374B (en) Security authentication method, system and related equipment
CN111464570B (en) New energy automobile detection data encryption method and device
CN114944921A (en) Login authentication method and device, electronic equipment and storage medium
CN111148213B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN114978552B (en) Security management method, device, equipment and medium for mailbox verification code
CN111143863A (en) Data processing method, device, equipment and computer readable storage medium
Ussatova et al. Two-factor authentication algorithm implementation with additional security parameter based on mobile application
CN114172664B (en) Data encryption and data decryption methods and devices, electronic equipment and storage medium
CN115174181B (en) Method, device, equipment and storage medium for realizing single sign-on
CN111835713B (en) Security authentication method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination