CN115905421A - Information verification method and device, computer equipment and computer readable storage medium - Google Patents

Information verification method and device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN115905421A
CN115905421A CN202211378674.6A CN202211378674A CN115905421A CN 115905421 A CN115905421 A CN 115905421A CN 202211378674 A CN202211378674 A CN 202211378674A CN 115905421 A CN115905421 A CN 115905421A
Authority
CN
China
Prior art keywords
information
verification
rule
user information
type
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211378674.6A
Other languages
Chinese (zh)
Inventor
韩立慧
李渊
陈璐
吴潇潇
韦旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202211378674.6A priority Critical patent/CN115905421A/en
Publication of CN115905421A publication Critical patent/CN115905421A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses an information checking method, an information checking device, computer equipment and a computer readable storage medium, which relate to the field of information processing, and the information checking method comprises the following steps: acquiring the verification information type of each channel, and determining a verification rule base according to the verification information type; responding to the received information verification request, and acquiring user information requiring verification and a verification information type of a target channel; calling a verification rule base, acquiring a verification rule corresponding to the type of the verification information of the target channel, and judging whether the user information is abnormal or not based on the verification rule; and if the user information is not abnormal, generating first prompt information for prompting that the user information is not abnormal. The check rule base is determined by integrating all check information types, so that a uniform check rule is provided for checking the user information, the consistency of the same type of user information is ensured, and the reliability of the obtained user information is further ensured.

Description

Information verification method and device, computer equipment and computer readable storage medium
Technical Field
The present invention relates to the field of information processing, and in particular, to an information verification method, apparatus, computer device, and computer-readable storage medium for use in financial technology or other related fields.
Background
With the rapid development of internet technology, various fields generally provide internet service platforms, and users can fill in user information required for transacting services through the service platforms, and then rapidly apply for transacting various types of services. With the increasing number of users of the service platform, the service platform needs to receive and transmit a large amount of user information corresponding to each type of service.
However, in the process of filling user information by the user through the service platform, the service platform cannot effectively verify the reliability of the user information, and the filled user information is abnormal conditions such as error information and invalid information, so that the transaction progress of the current business is influenced. In addition, various types of services can reuse user information such as identity information, address information, communication information, and the like. When the reliability of the user information is abnormal, various types of business processing progress can be influenced.
Disclosure of Invention
In view of the above, an object of the present invention is to provide an information verification method, apparatus, computer device and computer readable storage medium for overcoming the disadvantages in the prior art, so as to solve the problem that the reliability of user information cannot be verified.
In a first aspect, the present application provides an information checking method, where the method includes:
acquiring a verification information type of each channel, and determining a verification rule base according to the verification information type;
responding to the received information verification request, and acquiring user information requiring verification and a verification information type of a target channel;
calling the verification rule base, acquiring a verification rule corresponding to the verification information type of the target channel, and judging whether the user information is abnormal or not based on the verification rule;
and if the user information is not abnormal, generating first prompt information for prompting that the user information is not abnormal.
With reference to the first aspect, in a first possible implementation manner, the obtaining a verification information type of each channel, and determining a verification rule base according to the verification information type includes:
acquiring a verification information type of each channel, and determining a verification rule of each verification information type based on a length rule, a format rule and a preset character rule of the verification information type;
and determining a check rule base according to the check rule of each check information type.
With reference to the first possible implementation manner of the first aspect, in a second possible implementation manner, the obtaining a verification information type of each channel, and determining a verification rule of each verification information type based on a length rule, a format rule, and a preset character rule of the verification information type includes:
if the acquired channel verification information type is an address type, generating a verification rule of the address type based on a length rule, a format rule, a preset character rule, an address filling rule and an address number of each area of the address type.
With reference to the first aspect, in a third possible implementation manner, after the obtaining a verification information type of each channel and determining a verification rule base according to the verification information type, the method further includes:
and acquiring invalid information in a user invalid information database, and updating the verification rule base based on the invalid information.
With reference to the third possible implementation manner of the first aspect, in a fourth possible implementation manner, the method further includes:
matching the user information with invalid information in the verification rule base, and judging whether the user information requesting verification comprises the invalid information or not;
and if the user information comprises the invalid information, generating second prompt information for prompting that the user information is invalid.
With reference to the first aspect, in a fifth possible implementation manner, after the invoking the verification rule base, obtaining a verification rule corresponding to a type of verification information of the target channel, and determining whether the user information is abnormal based on the verification rule, the method further includes:
and if the user information is abnormal, generating third prompt information for prompting the user information to be abnormal.
With reference to the first aspect, in a sixth possible implementation manner, after the generating, if the user information is not abnormal, first prompt information for prompting that the user information is not abnormal, the method further includes:
updating a user information database based on the user information;
and responding to the received information calling request, and determining the user information in the user information database as the user information of the target channel.
In a second aspect, the present application provides an information checking apparatus, comprising:
the verification rule base obtaining module is used for obtaining the verification information type of each channel and determining a verification rule base according to the verification information type;
the verification request response module is used for responding to the received information verification request and acquiring the user information requesting verification and the verification information type of the target channel;
the information abnormity judging module is used for calling the verification rule base, acquiring a verification rule corresponding to the verification information type of the target channel and judging whether the user information is abnormal or not based on the verification rule;
and the abnormal prompting module is used for generating first prompting information for prompting that the user information is abnormal if the user information is abnormal.
In a third aspect, the present application provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the computer program, when executed by the processor, implements the information verification method according to the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the information verification method according to the first aspect.
The application provides an information checking method, which comprises the following steps: acquiring a verification information type of each channel, and determining a verification rule base according to the verification information type; responding to the received information verification request, and acquiring user information requesting verification and the verification information type of the target channel; calling the verification rule base, acquiring a verification rule corresponding to the verification information type of the target channel, and judging whether the user information is abnormal or not based on the verification rule; and if the user information is not abnormal, generating first prompt information for prompting that the user information is not abnormal. The check rule base is determined by integrating all check information types, so that a uniform check rule is provided for checking the user information, the consistency of the user information of the same type is ensured, and the reliability of the obtained user information is further ensured.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings required in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention. Like components are numbered similarly in the various figures.
Fig. 1 shows a flowchart of a first information verification method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a second information verification method according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating an example of an application scenario of a user information database provided by an embodiment of the present invention;
fig. 4 shows a schematic structural diagram of an information verification apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Hereinafter, the terms "including", "having", and their derivatives, which may be used in various embodiments of the present invention, are intended to indicate only specific features, numerals, steps, operations, elements, components, or combinations of the foregoing, and should not be construed as first excluding the presence of or adding to one or more other features, numerals, steps, operations, elements, components, or combinations of the foregoing.
Furthermore, the terms "first," "second," "third," and the like are used solely to distinguish one from another, and are not to be construed as indicating or implying relative importance.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which various embodiments of the present invention belong. The terms (such as those defined in commonly used dictionaries) should be interpreted as having a meaning that is consistent with their contextual meaning in the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein in various embodiments of the present invention.
Example 1
Referring to fig. 1, fig. 1 is a flowchart illustrating a first information verification method according to an embodiment of the present invention. The information verification method in fig. 1 includes:
s110, acquiring the verification information type of each channel, and determining a verification rule base according to the verification information type.
In order to facilitate understanding of the present application, in this embodiment, user information verification of banking services is taken as an example. The channel refers to a server through which a service passes in a process of transferring the service from a producer to a user, and may be a server for helping the user to complete banking services, such as an ATM (Automated Teller Machine), an online bank, a bank counter, and the like. Due to the fact that user information such as user names, address information and contact information sent and received by each channel are overlapped, the checking information type of each channel can be obtained, and the checking rule base is determined according to all the obtained checking information types. The check rule base is determined by integrating all check information types, so that a uniform check rule is provided for checking the user information, and the reliability of the obtained user information is ensured. It should be understood that the type of the verification information is set according to actual requirements, and may be the information types of the name, address, occupation, mailbox, mobile phone number, certificate number, and the like of the user, which is not limited herein.
As an example, the obtaining a verification information type of each channel and determining a verification rule base according to the verification information type includes:
acquiring a verification information type of each channel, and determining a verification rule of each verification information type based on a length rule, a format rule and a preset character rule of the verification information type;
and determining a check rule base according to the check rule of each check information type.
Each verification information type has different length, format and preset character requirements, and the verification rule of each verification information type is determined based on the length rule, the format rule and the preset character rule of each verification information type. Specifically, taking the verification information type as the mobile phone number type of the user as an example, the verification rule for verifying the information type includes: checking whether the length of the user information is equal to 11 digits, checking whether the format of the user information is a digital format, and checking whether the first character of the user information is a preset character 1.
Similarly, taking the verification information type as the mailbox type of the user as an example, the verification rule for verifying the information type includes: whether the length of the user information is equal to 100 characters or not is checked, whether the format of the user information is the format of A @ B.com or not is checked, whether the user information comprises the preset character @ and the preset character com or not is checked, wherein A and B are arbitrary character information and are not limited herein. And integrating the obtained check rule of each check information type, and obtaining each check rule base according to the check rule of the check information type.
In an optional example, the obtaining of the verification information type of each channel and determining the verification rule of each verification information type based on the length rule, the format rule, and the preset character rule of the verification information type includes:
and if the acquired channel verification information type is the address type, generating the address type verification rule based on the length rule, the format rule, the preset character rule, the address filling rule and the address number of each area of the address type.
Because different service types need to use user addresses with different precisions, when the verification information type is the address type, the verification rule of the address type also needs to be generated according to the address filling rule and the address number of each area. Specifically, the verification accuracy of the address type verification rule is used as the house number of the user, and the address filling rule is that the address should be a province (autonomous district) address, a city (autonomous state) address, a district (county/flag) address, a street address, a road address and a house number address in sequence. It should be understood that the address number of each area is set according to actual needs, and may be set according to "national administrative division code", which is not limited herein. By generating the address type check rule and checking the address information of the user through the address type check rule, the problem that the reliability of user information is influenced because the user fills different information in the same address is avoided.
Referring to fig. 2, fig. 2 is a flowchart illustrating a second information verification method according to an embodiment of the present invention.
As an example, after the S110 acquires the verification information type of each channel and determines the verification rule base according to the verification information type, the method further includes:
and S111, acquiring invalid information in a user invalid information database, and updating the verification rule base based on the invalid information.
In the process of transacting banking business and filling in user information, the user can fill in invalid information. Specifically, for example, if the user fills in a mobile phone number, and the vacant number indicates that no mobile phone number is used or does not exist, the vacant number can be stored as invalid information in the user invalid information database. And synchronizing the invalid information in the user invalid information database to the verification rule base, and updating the verification rule base. When the user information is verified, the invalid message in the verification rule base can be directly called, and whether the user information filled by the user is the invalid message or not is verified. Because the information such as the personal name, the personal certificate number and the like of the user is fixed, if the user information filled in by the user is not the information such as the personal fixed personal name, the personal certificate number and the like, the current user information is determined to be invalid information, and the invalid information corresponding to the user can be determined through a real-name authentication system, which is not described herein again.
In one optional example, the method further comprises:
matching the user information with invalid information in the verification rule base, and judging whether the user information requesting verification comprises the invalid information;
and if the user information comprises the invalid information, generating second prompt information for prompting that the user information is invalid.
And calling invalid information in the verification rule base, matching the user information with the invalid information, and judging whether the user information requiring verification comprises the invalid information. If the user information does not include invalid information, calling a verification rule of a verification rule base, and judging whether the user information requesting verification conforms to the verification rule. And if the user information comprises invalid information, generating second prompt information for prompting that the user information is invalid, and prompting the user to refill valid user information.
And S120, responding to the received information verification request, and acquiring the user information requesting verification and the verification information type of the target channel.
When the user transacts the banking business through the channel, the received information verification request is responded, the user information which is requested to be verified is obtained, and the verification information type of the target channel corresponding to the information verification request is determined. For example, if the user transacts the mobile phone number change service, the acquired verification information type of the target channel includes the mobile phone number type, the name type and the certificate number type of the user. And simultaneously, acquiring user information corresponding to each verification information type requested to be verified by the user.
Step 130, calling the verification rule base, obtaining a verification rule corresponding to the type of the verification information of the target channel, and judging whether the user information is abnormal or not based on the verification rule.
Because the check rule base integrates the check rules corresponding to all the check information types, when the user information is checked, the check rules corresponding to the check information types of the target channels in the check rule base can be directly called, and whether the user information is abnormal or not is judged based on the check rules. Specifically, taking the verification of the mobile phone number information of the user as an example, whether the first digit of the mobile phone number information in the user information is 1 is judged according to the verification rule; whether characters except numbers appear in the mobile phone number information or not; and whether the data length of the mobile phone number information is 11 digits is judged. And if the first digit of the mobile phone number information is 1, no character except the digit appears, and the data length is 11 digits, determining that the user information is abnormal. Similarly, if the first digit of the mobile phone number information is not 1, and/or characters other than the digits appear, and/or the data length is not 11 digits, it is determined that the user information is abnormal.
Step 140, if the user information is not abnormal, generating a first prompt message for prompting that the user information is not abnormal.
And when the user information accords with the verification rule, determining that the user information is abnormal, and generating first prompt information for prompting. And prompting the user that the information is abnormal through the first prompt information, and prompting the user to perform the next operation. The check rule base is determined by integrating all check information types, so that a uniform check rule is provided for checking the user information, the consistency of the same type of user information is ensured, and the reliability of the obtained user information is further ensured.
It should be understood that, it is also possible to send the check rule of the check rule base to the user terminal, and periodically update the check rule sent to the user terminal. Whether the user information is abnormal can be directly judged through the check rule stored to the user terminal, and the influence on the performance of the user terminal caused by the fact that the user terminal needs to frequently call an external interface to obtain the check rule of the check rule base is avoided.
As an example, after the invoking the verification rule base, obtaining the verification rule corresponding to the type of the verification information of the target channel, and determining whether the user information is abnormal based on the verification rule, the method further includes:
and if the user information is abnormal, generating third prompt information for prompting the user information to be abnormal.
And if the character length of the user information exceeds the character length corresponding to the length rule, and/or the character format of the user information does not conform to the character format corresponding to the format rule, and the user information does not comprise the preset character corresponding to the preset character rule, determining that the user information is abnormal, and generating third prompt information. And prompting the user that the information is abnormal through the third prompt message, prompting the user to fill in correct user information, and requesting to check the user information again.
As an example, after generating first prompt information for prompting that the user information is not abnormal if the user information is not abnormal, the method further includes:
updating a user information database based on the user information;
and responding to the received information calling request, and determining the user information in the user information database as the user information of the target channel.
Referring to fig. 3, fig. 3 is a diagram illustrating an application scenario of a user information database according to an embodiment of the present invention.
As shown in the figure, when the user transacts the banking business through the target channel 210, the user information required for transacting the banking business is filled in, and an information verification request is sent to the information platform 220. The information platform 220 is configured to respond to the information verification request, obtain a verification information type of the user information target channel 210 requesting verification, invoke a verification rule of the verification rule base 230, and determine whether the user information is abnormal based on the verification rule. If the user information is not abnormal, the obtained user information is determined to be reliable information, the obtained user information is synchronized to the user information database 240, and the user information database 240 is updated. The information of each user is integrated through the user information database 240, so as to obtain centralized, comprehensive and reliable user information.
When the user transacts banking again through the target channel 210, an information invocation request may be directly sent to the user information database 240. The user information database 240 determines the user information in the user information database 240 as the user information of the target channel in response to receiving the information call request. Since the user information can be repeatedly verified when various types of services are transacted, each subsystem can interact through the user information stored in the user information database 240, the user information in the user information database 240 is directly called, and the transaction efficiency of each service is improved.
The application provides an information checking method, which comprises the following steps: acquiring a verification information type of each channel, and determining a verification rule base according to the verification information type; responding to the received information verification request, and acquiring user information requiring verification and a verification information type of a target channel; calling the verification rule base, acquiring a verification rule corresponding to the verification information type of the target channel, and judging whether the user information is abnormal or not based on the verification rule; and if the user information is not abnormal, generating first prompt information for prompting that the user information is not abnormal. The check rule base is determined by integrating all check information types, so that a uniform check rule is provided for checking the user information, the consistency of the same type of user information is ensured, and the reliability of the obtained user information is further ensured.
Example 2
Referring to fig. 4, fig. 4 is a schematic structural diagram of an information checking apparatus according to an embodiment of the present invention. The information verifying apparatus 300 in fig. 4 includes:
a verification rule base obtaining module 310, configured to obtain a verification information type of each channel, and determine a verification rule base according to the verification information type;
a verification request response module 320, configured to respond to the received information verification request, and obtain the user information requesting verification and the verification information type of the target channel;
the information anomaly judgment module 330 is configured to call the verification rule base, acquire a verification rule corresponding to the type of the verification information of the target channel, and judge whether the user information is anomalous based on the verification rule;
the abnormal prompting module 340 is configured to generate a first prompting message for prompting that the user information is abnormal if the user information is abnormal.
As an example, the check rule base obtaining module 310 includes:
the verification rule determining submodule is used for acquiring the verification information type of each channel and determining the verification rule of each verification information type based on the length rule, the format rule and the preset character rule of the verification information type;
and the verification rule base submodule is used for determining a verification rule base according to the verification rule of each verification information type.
In an optional example, the verification rule determining sub-module is further configured to, if the obtained type of the channel verification information is an address type, generate a verification rule for the address type based on a length rule, a format rule, a preset character rule, an address filling rule, and an address number of each area of the address type.
As an example, the information verification apparatus 300 further includes:
and the verification rule base updating module is used for acquiring invalid information in the user invalid information database and updating the verification rule base based on the invalid information.
In an optional example, the information checking apparatus 300 further includes:
the invalid information judging module is used for matching the user information with invalid information in the verification rule base and judging whether the user information requesting verification comprises the invalid information or not;
and the invalid prompting module is used for generating second prompting information for prompting that the user information is invalid if the user information comprises the invalid information.
As an example, the information verification apparatus 300 further includes:
and the abnormity prompting module is used for generating third prompting information for prompting the abnormity of the user information if the user information is abnormal.
As an example, the information verification apparatus 300 further includes:
the user information database updating module is used for updating the user information database based on the user information;
and the information calling module is used for responding to the received information calling request and determining the user information in the user information database as the user information of the target channel.
The information checking apparatus 300 is configured to perform corresponding steps in the information checking method, and specific implementations of various functions are not described one by one here. In addition, the alternative example in embodiment 1 is also applied to the information verification apparatus 300 of embodiment 2.
An embodiment of the present application further provides a computer device, where the computer device includes a memory and a processor, where the memory stores a computer program, and when the processor executes the computer program, the information verification method according to embodiment 1 is implemented.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the information verification method according to embodiment 1 is implemented.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention or a part thereof which contributes to the prior art in essence can be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention.

Claims (10)

1. An information verification method, comprising:
acquiring a verification information type of each channel, and determining a verification rule base according to the verification information type;
responding to the received information verification request, and acquiring user information requiring verification and a verification information type of a target channel;
calling the verification rule base, acquiring a verification rule corresponding to the verification information type of the target channel, and judging whether the user information is abnormal or not based on the verification rule;
and if the user information is not abnormal, generating first prompt information for prompting that the user information is not abnormal.
2. The information verification method according to claim 1, wherein the obtaining of the verification information type of each channel and determining a verification rule base according to the verification information type comprises:
acquiring a verification information type of each channel, and determining a verification rule of each verification information type based on a length rule, a format rule and a preset character rule of the verification information type;
and determining a check rule base according to the check rule of each check information type.
3. The information verification method according to claim 2, wherein the obtaining of the verification information type of each channel and the determining of the verification rule of each verification information type based on the length rule, the format rule, and the preset character rule of the verification information type comprises:
and if the acquired channel verification information type is the address type, generating the address type verification rule based on the length rule, the format rule, the preset character rule, the address filling rule and the address number of each area of the address type.
4. The information verification method according to claim 1, wherein after obtaining the verification information type of each channel and determining the verification rule base according to the verification information type, the method further comprises:
and acquiring invalid information in a user invalid information database, and updating the verification rule base based on the invalid information.
5. The information verification method of claim 4, further comprising:
matching the user information with invalid information in the verification rule base, and judging whether the user information requesting verification comprises the invalid information;
and if the user information comprises the invalid information, generating second prompt information for prompting that the user information is invalid.
6. The information verification method according to claim 1, wherein the invoking the verification rule base to obtain the verification rule corresponding to the type of the verification information of the target channel, and after determining whether the user information is abnormal based on the verification rule, further comprises:
and if the user information is abnormal, generating third prompt information for prompting the user information to be abnormal.
7. The information verification method according to claim 1, wherein after generating, if the user information is not abnormal, first prompt information for prompting that the user information is not abnormal, the method further comprises:
updating a user information database based on the user information;
and responding to the received information calling request, and determining the user information in the user information database as the user information of the target channel.
8. An information verifying apparatus, comprising:
the verification rule base obtaining module is used for obtaining the verification information type of each channel and determining a verification rule base according to the verification information type;
the verification request response module is used for responding to the received information verification request and acquiring the user information requesting verification and the verification information type of the target channel;
the information abnormity judging module is used for calling the verification rule base, acquiring a verification rule corresponding to the verification information type of the target channel and judging whether the user information is abnormal or not based on the verification rule;
and the abnormal prompting module is used for generating first prompting information for prompting that the user information is abnormal if the user information is abnormal.
9. A computer device, characterized in that the computer device comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, implements the information checking method according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the information verification method according to any one of claims 1 to 7.
CN202211378674.6A 2022-11-04 2022-11-04 Information verification method and device, computer equipment and computer readable storage medium Pending CN115905421A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211378674.6A CN115905421A (en) 2022-11-04 2022-11-04 Information verification method and device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211378674.6A CN115905421A (en) 2022-11-04 2022-11-04 Information verification method and device, computer equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN115905421A true CN115905421A (en) 2023-04-04

Family

ID=86471983

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211378674.6A Pending CN115905421A (en) 2022-11-04 2022-11-04 Information verification method and device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN115905421A (en)

Similar Documents

Publication Publication Date Title
CN112615871A (en) Method and device for sending authenticable message in cross-link mode
KR20170137138A (en) Address matching based risk identification method and apparatus
CN111163182A (en) Block chain-based device registration method and apparatus, electronic device, and storage medium
CN109831494B (en) User data management method and device
CN108234549B (en) Policy information checking method and device
CN105100029A (en) Method and device for user identity verification
CN112669062B (en) Electronic card management method, server, system and storage medium
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
CN111885043B (en) Internet account login method, system, equipment and storage medium
CN105260870A (en) Identity identification method, identity identification system and identity identification terminal
CN114022151A (en) Block chain data visualization method and system, electronic device and storage medium
CN113239398A (en) Service processing method and device
CN111260475A (en) Data processing method, block chain node point equipment and storage medium
CN111768198A (en) Digital currency transaction method, device and wallet integral system
CN114239072A (en) Block chain node management method and block chain network
CN113326503A (en) Certificate management method and computing device
CN110175915B (en) Service execution result obtaining method and system based on block chain
CN115905421A (en) Information verification method and device, computer equipment and computer readable storage medium
CN111460403A (en) Information processing method and system
CN111192040B (en) Registration method and system for mechanism identification number
CN110852864B (en) Digital resource amount processing method, device and storage medium
CN101931855A (en) Method and system for registering and querying changed telephone number
CN113836428A (en) Business pushing method and device, computer equipment and storage medium
CN112396418A (en) Information processing method, device and system
CN111815327A (en) Data true checking method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination