CN116436655A - Account authentication method, device, equipment and medium - Google Patents
Account authentication method, device, equipment and medium Download PDFInfo
- Publication number
- CN116436655A CN116436655A CN202310320502.1A CN202310320502A CN116436655A CN 116436655 A CN116436655 A CN 116436655A CN 202310320502 A CN202310320502 A CN 202310320502A CN 116436655 A CN116436655 A CN 116436655A
- Authority
- CN
- China
- Prior art keywords
- authentication
- account
- authenticated
- auxiliary
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 99
- 230000001960 triggered effect Effects 0.000 claims description 26
- 238000012795 verification Methods 0.000 claims description 24
- 238000003860 storage Methods 0.000 claims description 16
- 230000006870 function Effects 0.000 claims description 14
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 11
- 230000006872 improvement Effects 0.000 description 11
- 230000001976 improved effect Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000013480 data collection Methods 0.000 description 2
- 230000001939 inductive effect Effects 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000002650 habitual effect Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the specification discloses an account authentication method, which comprises the following steps: if an account authentication instruction corresponding to an account to be authenticated is acquired, determining identification information according to the account authentication instruction, and judging whether an auxiliary authentication account corresponding to the identification information exists or not; if yes, sending out authentication information by using the available contact ways of the auxiliary authentication account; if the authentication feedback information sent by the sending terminal or the sending application program of the account authentication instruction is obtained, whether the account to be authenticated passes authentication is judged according to the authentication feedback information.
Description
The application is a divisional application of Chinese patent application CN112910896A, and the application date of the original application is as follows: 2021, 2; the application number is: 202110146110.9; the invention is named as follows: account authentication method, device, equipment and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a medium for account authentication.
Background
In the prior art, for some internet accounts, after authentication (e.g., real-name authentication) is required, various functions of the accounts can be used.
In view of this, there is a need for more effective and efficient account authentication schemes.
Disclosure of Invention
The embodiment of the specification provides an account authentication method, device, equipment and medium, which are used for solving the technical problem of how to perform account authentication related data processing more effectively and more efficiently.
In order to solve the technical problems, the embodiment of the specification provides the following technical scheme:
the embodiment of the specification provides a first account authentication method, which comprises the following steps:
if an account authentication instruction corresponding to an account to be authenticated is acquired, determining identification information according to the account authentication instruction, and judging whether an auxiliary authentication account corresponding to the identification information exists or not;
if yes, sending out authentication information by using the available contact ways of the auxiliary authentication account;
if the authentication feedback information sent by the sending terminal or the sending application program of the account authentication instruction is obtained, whether the account to be authenticated passes authentication is judged according to the authentication feedback information.
The embodiment of the specification provides a second account authentication method, which comprises the following steps:
after the account authentication condition is triggered, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode;
If authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an identification information providing page is displayed;
if the identification information is acquired, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated;
or alternatively, the first and second heat exchangers may be,
after the account authentication condition is triggered, displaying an identification information providing page;
if the identification information is acquired, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode;
if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated;
the method further comprises the steps of: if an authentication feedback instruction sent by the authentication server is obtained, displaying an authentication feedback page, wherein the authentication feedback page is used for obtaining authentication feedback information;
if the authentication feedback information is acquired, the authentication feedback information is sent to the authentication server, and the authentication feedback information is used for the authentication server to judge whether the account to be authenticated passes authentication or not;
The account authentication instruction comprises account information to be authenticated and the identification information.
The embodiment of the specification provides an account authentication device, which comprises:
the account judgment module is used for determining identification information according to the account authentication instruction if the account authentication instruction corresponding to the account to be authenticated is acquired, and judging whether an auxiliary authentication account corresponding to the identification information exists or not;
the authentication initiating module is used for sending authentication information by utilizing the available contact ways of the auxiliary authentication account if the auxiliary authentication account corresponding to the identification information exists;
and the authentication judging module is used for judging whether the account to be authenticated passes authentication according to the authentication feedback information if the authentication feedback information sent by the issuing terminal or the issuing application program of the account authentication instruction is obtained.
An embodiment of the present disclosure provides an account identifying apparatus, including:
the authentication request module is used for displaying an authentication mode selection page after the account authentication condition is triggered, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an identification information providing page is displayed; if the identification information is acquired, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated; or alternatively, the first and second heat exchangers may be,
After the account authentication condition is triggered, displaying an identification information providing page; if the identification information is acquired, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated;
the authentication feedback module is used for displaying an authentication feedback page if an authentication feedback instruction sent by the authentication server is acquired, wherein the authentication feedback page is used for acquiring authentication feedback information; if the authentication feedback information is acquired, the authentication feedback information is sent to the authentication server, and the authentication feedback information is used for the authentication server to judge whether the account to be authenticated passes authentication or not;
the account authentication instruction comprises account information to be authenticated and the identification information.
The embodiment of the specification provides account authentication equipment, which comprises the following components:
at least one processor;
the method comprises the steps of,
a memory communicatively coupled to the at least one processor;
Wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the first or second account authentication method described above.
Embodiments of the present disclosure provide a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, implement the first or second account authentication method described above.
The above-mentioned at least one technical scheme that this description embodiment adopted can reach following beneficial effect:
by authenticating the account to be authenticated by the auxiliary authentication account, the account authentication efficiency and effect and the account authentication security can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required in the embodiments of the present description or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments described in the present description, and that other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
Fig. 1 is a schematic diagram of an execution main body of an account authentication method in the first embodiment of the present specification.
Fig. 2 is a flowchart of an account authentication method in the first embodiment of the present specification.
Fig. 3 is a schematic diagram of an account authentication process in the first embodiment of the present specification.
Fig. 4 is a schematic view of a page in the first embodiment of the present specification.
FIG. 5 is a schematic view of another page in the first embodiment of the present disclosure
Fig. 6 is another page schematic in the first embodiment of the present specification.
Fig. 7 is another page schematic in the first embodiment of the present specification.
Fig. 8 is another page diagram in the first embodiment of the present specification.
Fig. 9 is a flowchart of an account authentication method in the second embodiment of the present specification.
Fig. 10 is a schematic structural diagram of an account authentication apparatus in the third embodiment of the present specification.
Fig. 11 is a schematic configuration diagram of an account authentication apparatus in the fourth embodiment of the present specification.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
In the prior art, for certain types of internet accounts, after authentication (e.g., real-name authentication) is required, various functions of the accounts may be available. For example, for some types of financial accounts, real-name authentication is required before the functions of deposit, payment, transfer, financial accounting, etc. of the accounts can be used. Existing account authentication is based mainly on KYC (Know Your Customer): current industry-related legal regulations require natural persons, legal persons and other organizations to make a comprehensive understanding of their customers, i.e., the "know your customers" principle. The main goal of KYC is to effectively discover and report suspicious activity through verification of the identity of the customer and knowledge of the business activity, because abnormal, perhaps suspicious, activity cannot be reasonably and effectively discovered from the customer's daily, habitual activity unless the customer is well understood and able to predict the customer's business activity.
One of the account authentication contents is to perform real-name authentication on accounts, especially financial accounts, and real-name authentication is a common requirement. The main purpose of real-name authentication is to ensure that the account under the user name belongs to the user himself, so that the real-name authentication has direct effects on account theft prevention, fraud, security level improvement and user experience improvement. Meanwhile, the user can actively perfect the identity information continuously, which is beneficial to improving the internet information management capability and the big data identity recognition capability, and provides better service for the user.
The existing account authentication method is as follows: the user provides identity information, and then the internet service provider (i.e. the internet account provider) authenticates the account to be authenticated by a binding bank card authentication mode (comparing whether the identity information provided by the user is consistent with the identity element information reserved by the bound bank card in a bank) or a face scanning authentication mode (comparing whether the face acquired currently is consistent with the face corresponding to the identity information provided by the user in a face acquisition library) or a KBA (knowledgement-based authentication) class authentication mode, namely, the user answers at least one account related problem, and the relationship between the user and the account is confirmed).
In the existing account authentication mode, due to privacy information protection and account authentication cost consideration, the user actively provides face images or bank card information with lower willingness, and the user is required to perform multi-step operation to provide the face images or the bank card information, so that the account authentication willingness of the user is further reduced.
In addition, the existing account authentication method has a plurality of security problems. For example, if a binding bank card authentication mode is adopted, the bank card of the user may be stolen by others, so that the bank card is used for account authentication by others; if a face scanning verification mode is adopted, the risk of forging the face possibly exists; if a KBA type verification mode is adopted, on the one hand, the KBA problem is usually a universality problem, such as a last shopping product, a last added friend and the like, and the problem is likely to be that the user does not always answer 100% correctly, so that the authentication accuracy is lower; on the other hand, the problem of KBA is likely to be at break risk, and other people can continuously test and answer through a violent try method, so that the possibility of KBA verification is high to a certain extent, and the authentication security is low.
The first embodiment (hereinafter referred to as "the present embodiment") of the present disclosure provides an account authentication method, where the execution subject of the present embodiment may be a terminal (including but not limited to a mobile phone, a computer, a pad, a television) or a server or an operating system or an account authentication platform or an account authentication system or an application program, that is, the execution subject may be various, and may be set, used, or changed according to needs. In addition, a third party application may also assist the execution body in executing the embodiment. For example, as shown in fig. 1, the account authentication method in the present embodiment may be performed by a server, and an application program corresponding to (the server) may be installed on a terminal (held by a user), data transmission may be performed between the terminal or the application program and the server, and data collection or input or output or page or information processing may be performed through the terminal or the application program, thereby assisting the server in performing the account authentication method in the present embodiment.
As shown in fig. 2 and 3, the account authentication method provided in this embodiment includes:
s101: if an account authentication instruction corresponding to an account to be authenticated is acquired, determining identification information according to the account authentication instruction, and judging whether an auxiliary authentication account corresponding to the identification information exists or not;
In this embodiment, the executing body may acquire an account authentication instruction sent by the terminal or an application (the application is installed on the terminal, and the same applies to the terminal). The account authentication instruction is used for enabling the execution main body to authenticate the account to be authenticated, and the authentication of the account to be authenticated includes but is not limited to real-name authentication of the account to be authenticated.
How the terminal or application sends the account authentication instructions may take a variety of forms. For example, the terminal may install the corresponding application program, and after the user opens the corresponding interface of the application program, the application program provides account authentication service for the user through corresponding options or buttons on the interface, that is, the user may initiate account authentication through the options or buttons on the interface (for example, the interface shown in fig. 4 has an "start authentication" option on the interface, and the user may click on the option to initiate account authentication). Or the interface can be provided with guiding or prompting information, so that the user is guided or prompted to initiate account authentication. After the user initiates account authentication, the terminal or the application program can generate an account authentication instruction and send the account authentication instruction to the execution body.
In addition, the terminal or the application program may also display an authentication content selection page, where the authentication content selection page is used to select account authentication content or authentication form, that is, to select what kind of authentication is performed on the account by the user, for example, performing real-name authentication, credit level authentication, or authentication of other forms or contents, for example, as shown in fig. 5. If only one authentication content or authentication form is provided in the present embodiment, fig. 5 may not be displayed, but fig. 4 is displayed; if the present embodiment can provide various authentication contents or authentication forms, fig. 4 may not be displayed, but fig. 5 is displayed, or fig. 4 and fig. 5 are sequentially displayed.
Specifically, the terminal or the application program may preset an account authentication condition, the user's operation on the terminal or the application program may trigger the account authentication condition (for example, the user clicks on the "start authentication" option in fig. 4, thereby triggering the account authentication condition, or the user clicks on the guiding or prompting information to trigger the account authentication condition), and if the account authentication condition is triggered, the terminal or the application program may determine that the user initiates the account authentication. After the account authentication condition is triggered, the terminal or the application program can generate an account authentication instruction and send the account authentication instruction to the execution body.
If the executing body acquires the account authentication instruction, the account to be authenticated can be determined according to the account authentication instruction, namely the account authentication instruction corresponds to the account to be authenticated. The account authentication instruction may include account information of the account to be authenticated (the account information is used for determining the account, and the account information includes but is not limited to an account name and a mobile phone number, which are the same as the account to be authenticated), so that the executing body takes an account corresponding to the account information in the account authentication instruction as the account to be authenticated.
The account information included in the account authentication instruction may be as described in 1.1 and/or 1.2 (the embodiment is not limited to 1.1 and/or 1.2):
1.1, account authentication instruction comprises login account information on a terminal or an application program
When the user operates the terminal or the application program, if the user logs in an account on the terminal or the application program (i.e. the terminal or the application program is in a logged-in state, for example, as shown in fig. 4), the account authentication instruction generated by the terminal or the application program may include account information of the logged-in account on the terminal or the application program, that is, the logged-in account on the terminal or the application program is an account to be authenticated. Specifically, after the account authentication condition is triggered, the terminal or the application program takes the logged-in account on the account authentication condition as an account to be authenticated, and the account information of the logged-in account is contained in the account authentication instruction.
1.2, account authentication instruction includes account information provided by user
After the account authentication condition is triggered, the terminal or the application program can display an account providing page, wherein the account providing page is used for providing account information for a user. Wherein the account provisioning page may be for the user to select or enter account information, or for the user to otherwise provision account information. For example, the account provisioning page may display a list of accounts that the user has logged in to the terminal or application for selection by the user (e.g., fig. 6 shows the accounts in the drawing only schematically, and not representing the actual accounts), or the account provisioning page may have an input box for the user to enter account information (e.g., fig. 6). After the user provides account information through the account providing page, the terminal or the application program obtains the account information provided by the user and includes the obtained account information in the account authentication instruction, namely, the account corresponding to the account information provided by the user is the account to be authenticated.
In this embodiment, the terminal or the application may also display other pages in a manner of 2.1 and/or 2.2 and/or 2.3 and/or 2.4 (the embodiment is not limited to a manner of 2.1 and/or 2.2 and/or 2.3 and/or 2.4):
2.1 if the logged-in account is used as the account to be authenticated as in 1.1, the terminal or the application program may display an authentication mode selection page (for example, as shown in fig. 7) after the account authentication condition is triggered. The authentication mode selection page is used for (a user) selecting an account authentication mode, and the same is followed. After the user selects the account authentication mode, the terminal or the application program generates authentication mode selection data according to the user operation, i.e. the terminal or the application program can acquire the authentication mode selection data. If the terminal or the application program obtains the authentication mode selection data, the selected account authentication mode can be determined according to the authentication mode selection data, and the selected account authentication mode is the account authentication mode corresponding to the account to be authenticated (the same applies below). The account authentication method may include an account auxiliary authentication method.
If the terminal or application determines that the account auxiliary authentication method is selected based on the authentication method selection data, the terminal or application may display an identification information providing page (for example, as shown in fig. 8). The identification information providing page is used for providing identification information (for a user), and the same applies below. The identification information providing page can be used for a user to select or input the identification information or provide the identification information in other modes, and the specific layout or content of the identification information providing page can refer to the account providing page.
After the user provides the identification information through the identification information providing page, the terminal or the application program can acquire the identification information provided by the user. If the terminal or the application program acquires the identification information, the account authentication instruction can be sent to the execution subject.
And 2.2, if the logged-in account is used as an account to be authenticated as in 1.1, the terminal or the application program can display the identification information providing page after the account authentication condition is triggered. And if the terminal or the application program acquires the identification information, displaying the authentication mode selection page. If the terminal or the application program acquires the authentication mode selection data and determines that the account auxiliary authentication mode is selected according to the authentication mode selection data, the account authentication instruction can be sent to the execution body.
And 2.3, if the account to be authenticated is required to be provided by the user as in 1.2, the terminal or the application program can display the account providing page firstly after the account authentication condition is triggered. After the account information provided by the user is obtained, the authentication mode selection page and the identification information providing page are displayed successively as in 2.1. If the terminal or the application program acquires the identification information, the account authentication instruction can be sent to the execution subject.
And 2.4, if the account to be authenticated is required to be provided by the user as in 1.2, the terminal or the application program can display the account providing page firstly after the account authentication condition is triggered. After the account information provided by the user is obtained, the identification information providing page and the authentication mode selecting page are displayed successively as in 2.2. If the terminal or the application program acquires the authentication mode selection data and determines that the account auxiliary authentication mode is selected according to the authentication mode selection data, the account authentication instruction can be sent to the execution body.
Through the pages, the terminal or the application program can determine the account authentication mode and acquire the identification information.
In this embodiment, the identification information may be used to determine an account. Since the user identity information is typically filled out when registering the account, the identification information may be user identity information (including name and/or other identity information).
In this embodiment, the account authentication instruction may include authentication mode information, where the authentication mode information is used to characterize the (selected) account authentication mode. The authentication mode information may be generated according to authentication mode selection data, or the authentication mode information may be authentication mode selection data.
If the executing body acquires the account authentication instruction, the identifying information can be determined according to the account authentication instruction (namely, the identifying information contained in the account authentication instruction is determined).
If the executing body acquires the account authentication instruction, the account authentication mode corresponding to the account to be authenticated can be determined according to the account authentication instruction. Specifically, the executing body may determine an account authentication mode corresponding to the account to be authenticated according to the authentication mode information in the account authentication instruction.
In this embodiment, if the executing body determines that the account authentication method corresponding to the account to be authenticated is an account auxiliary authentication method, the executing body determines whether an auxiliary authentication account corresponding to the identification information exists. If the executing body determines that the account authentication mode corresponding to the account to be authenticated is not the account auxiliary authentication mode, the executing body does not determine whether an auxiliary authentication account corresponding to the identification information exists; or the identification information in the account authentication instruction is not used to determine the secondary authentication account, e.g. the identification information in the account authentication instruction is used by the executing entity to store the identification information or by the executing entity to refine (to be authenticated) the account information with the identification information.
In this embodiment, the determining, by the executing body, whether or not there is the auxiliary authentication account corresponding to the identification information may include:
s1011: determining an authenticated account corresponding to the identification information;
specifically, "an account that is registered using the identification information and authenticated (including, but not limited to, real-name authentication)" may be used as the authenticated account corresponding to the identification information. Whether the account is authenticated or not can be used as a screening condition of whether the account can be used as a secondary authentication account or not, and if the account is authenticated, the account can be primarily determined to be a trusted account.
In particular, as described above, the user may select what content or form of authentication is performed on the account to be authenticated, and the terminal or application may include the authentication content or authentication form selected by the user in the account authentication instruction, so that the executing body may determine the authentication content or authentication form of the account to be authenticated according to the account authentication instruction, and the authentication content or authentication form of the authenticated account corresponding to the "identification information" determined by the executing body may correspond to the authentication content or authentication form selected by the user. For example, if the user selects to perform real-name authentication on the account to be authenticated, the authenticated account corresponding to the identification information may be "the authenticated account corresponding to the identification information"; if the user selects to perform the level authentication on the account to be authenticated, the authenticated account corresponding to the identification information may be the "authenticated account with the level corresponding to the identification information".
S1013: determining whether a secondary authentication account exists in the authenticated account.
In this embodiment, the executing body may preset the auxiliary authentication condition, and use the account that meets the auxiliary authentication condition as the auxiliary authentication account. Wherein determining whether a secondary authentication account exists in the authenticated account may include: judging whether each authenticated account accords with auxiliary authentication conditions according to account attribute data and/or account operation data of each authenticated account; and taking the authenticated account meeting the auxiliary authentication condition as an auxiliary authentication account.
Specifically, determining whether each of the authenticated accounts meets the auxiliary authentication condition according to the account attribute data and/or the account operation data of each of the authenticated accounts may include: scoring each authenticated account according to account attribute data and/or account operation data of each authenticated account; and judging whether each authenticated account meets the auxiliary authentication condition according to the scoring score.
In this embodiment, the account attribute data includes, but is not limited to, identity card verification information and/or subscription card information and/or face verification information and/or non-inductive authentication identification information and/or address book information of the account and/or external relationship data (or external relationship network) of the account a. And for any account A, scoring the account A according to address book information of the account A and/or external relation data (or external relation network) of the account A and/or whether the account A performs identity card verification and/or whether the account A performs subscription card and/or whether the account A performs face verification and/or whether the account A performs non-inductive authentication identification.
In particular, for address book information of the account a, if the address book of the account a has the account B, the account a may be scored according to whether the account B authenticates and/or registration information (including a registered mobile phone number) of the account B and/or a remark of the account B for the account a and/or a relationship between the account B and the account a, for example, if the authentication of the account B and/or the registration information of the account B corresponds to other authenticated accounts and/or the remark of the account B for the account a is positive or enthusiastic and/or the account B and the account a achieve a certain relationship, the score of the account a is beneficial to be improved; correspondingly, if the account B is not authenticated and/or the registration information of the account B does not correspond to the authenticated account and/or the remark of the account B for the account a is negative or the remark of the polarity is eliminated and/or the account B and the account a do not reach a certain affinity, the score of the account a is not beneficial to improvement. Whether the remarks are positive or not can be judged through remark character recognition or other modes; whether the affinity is reached can be judged by the interaction data or other data between accounts.
The account operational data includes, but is not limited to, transaction data of the account, such as transaction amount, transaction time, transaction type, transaction location, etc., and/or security operational data, such as account password modification. For example, for any account C, if the account C performs payment operations at the same time or similar times at different places, the probability of security risk of the account C is high, which is not beneficial to improving the scoring of the account C.
In this embodiment, the account attribute data and/or the account operation data may be input into an account scoring model, and the account scoring model outputs the score of each of the authenticated accounts. And for any account, if the score of the account reaches a preset threshold value, judging that the account meets the auxiliary authentication condition.
From the above, it can be seen that, for any account except the account to be authenticated corresponding to the identification information, it is determined whether the account can be used as the auxiliary authentication account or not, and a two-layer discrimination condition can be adopted. The first layer, the auxiliary authentication account is selected from the authenticated accounts corresponding to the identification information, whether the account is authenticated can be used as a screening condition of the auxiliary authentication account, and if the account is authenticated, the account can be primarily judged to be a trusted account; and the second layer is used for scoring the accounts of each authenticated account corresponding to the identification information, and judging whether each authenticated account meets the auxiliary authentication condition according to the scoring score. If the account meets the auxiliary authentication condition, the account is trusted and can be used as the auxiliary authentication account. Further, since the auxiliary authentication account is a trusted account, the auxiliary authentication account may have a higher importance than other accounts corresponding to the identification information and may be used as the auxiliary authentication account.
S103: if the executing body judges that the auxiliary authentication account corresponding to the identification information exists, sending out authentication information by using the available contact information of the auxiliary authentication account;
for any account, contact may be made with the account, i.e., with the user of the account, through a variety of contact means. For example, when registering the account, the mobile phone number is used as registration information, so that a short message can be sent to the mobile phone number used for registering the account or a call can be made to the mobile phone number to get in touch with the account, or a message can be sent to a login terminal or a login application program of the account (i.e. a terminal or an application program for logging in the account, which will be the same as the terminal or application program) to get in touch with the account.
And if the executive body judges that the auxiliary authentication account corresponding to the identification information exists, the executive body can send out the authentication information by utilizing the available contact ways of the auxiliary authentication account. Specifically, issuing authentication information using the available contact addresses of the secondary authentication account includes, but is not limited to: transmitting authentication information (which can be authentication information in the form of a common short message) to a contact number (such as a mobile phone number) used for registering the auxiliary authentication account; and/or dialing a contact number of the auxiliary authentication account, and broadcasting authentication information after the contact number is connected; and/or sending authentication information to the auxiliary authentication account.
In this embodiment, the authentication information may be verification code information or other information with verification or authentication function, and the authentication information may include account information of an account to be authenticated, so as to prompt a receiver of the authentication information to authenticate which account.
S105: and if the (executing body) acquires the authentication feedback information sent by the issuing terminal or the issuing application program of the account authentication instruction, judging whether the account to be authenticated passes authentication according to the authentication feedback information.
Because the auxiliary authentication account and the account to be authenticated correspond to the same identification information, in theory, the auxiliary authentication account and the account to be authenticated should be held by the same user. The executive body sends out the authentication information by utilizing the available contact ways of the auxiliary authentication account, so that the account holder of the auxiliary authentication account can conveniently acquire the authentication information. In this embodiment, the auxiliary authentication account is used to authenticate the account to be authenticated, so if the auxiliary authentication account and the account to be authenticated are held by the same user, the user of the account to be authenticated (i.e. the user of the auxiliary authentication account) should also obtain the authentication information, and the authentication information obtained by the user needs to be used to authenticate or verify the account to be authenticated.
In this embodiment, if the executing body determines that there is a secondary authentication account corresponding to the identification information, the executing body may send an authentication feedback instruction to an issuing terminal or an issuing application of the account authentication instruction (that is, the foregoing terminal or application that issues the account authentication instruction, which will be described later) in addition to issuing authentication information by using an available contact of the secondary authentication account, so that the issuing terminal or the issuing application displays an authentication feedback page, where the authentication feedback page is used to provide the authentication feedback information.
Because the user of the account to be authenticated initiates the account authentication through the sending terminal or the sending application program, and the sending terminal or the sending application program sends an account authentication instruction to the execution main body, after the sending terminal or the sending application program displays the authentication feedback page, if the user of the account to be authenticated receives the authentication information, the authentication feedback information can be provided through the authentication feedback page.
In this embodiment, the authentication feedback information corresponds to the authentication information, for example, if the authentication information is information including a verification code, the authentication feedback information may be the verification code in the authentication information, so that the authentication feedback page may be a page for the user to fill in the verification code, as shown in fig. 9, for example. Of course, if the authentication information is other types of information, the authentication feedback information may be information other than the verification code, which corresponds to the authentication information.
After providing the authentication feedback information through the authentication feedback page, the user sends out a terminal or an application program to obtain the authentication feedback information and sends the authentication feedback information to an execution main body. If the executing body acquires the authentication feedback information sent by the sending terminal or the sending application program, the executing body can judge whether the account to be authenticated passes authentication according to the authentication feedback information, namely whether the account to be authenticated passes authentication.
In this embodiment, after the executing body obtains the account authentication instruction, if it is determined that there is no auxiliary authentication account corresponding to the identification information, the executing body may send the first authentication result information to the issuing terminal or the issuing application of the account authentication instruction, so that the issuing terminal or the issuing application may display the auxiliary authentication account determination result (for example, if the executing body determines that there is no auxiliary authentication account corresponding to the identification information, the executing body may send the first authentication result information to the issuing terminal or the issuing application of the account authentication instruction, so that the issuing terminal or the issuing application may display that there is no available auxiliary authentication account), and/or so that the issuing terminal or the issuing application (through a page) may prompt selection of an account authentication method other than the account auxiliary authentication (for example, the user selects the account auxiliary authentication method, and if the executing body determines that there is no auxiliary authentication account corresponding to the identification information, the executing body may send the first authentication result information to the issuing terminal or the issuing application of the account authentication instruction, so that the issuing terminal or the issuing application prompts the user to select another account authentication method.
In this embodiment, after the executing body obtains the authentication feedback information sent by the sending terminal or the sending application program, and determines whether the account to be authenticated passes or not according to the authentication feedback information, the executing body may send second authentication result information to the sending terminal or the sending application program of the account authentication instruction, so that the sending terminal or the sending application program (through the page) displays an authentication result (for example, the account authentication is successful or unsuccessful) of the account to be authenticated and/or prompts the sending terminal or the sending application program (through the page) to select an account authentication mode other than the account auxiliary authentication (for example, the user selects an account auxiliary authentication mode, if the executing body obtains the authentication feedback information and determines that the authentication does not pass, the executing body may send the second authentication result information to the sending terminal or the sending application program of the account authentication instruction, so that the sending terminal or the sending application program prompts the user to select other account authentication modes.
In this embodiment, the executing body may preset a time period, if the executing body does not receive the authentication feedback information within the preset time period after sending the authentication information, the executing body determines that the authentication fails and/or the executing body sends third authentication result information to the sending terminal or the sending application program of the account authentication instruction, so that the sending terminal or the sending application program (through the page) of the account authentication instruction displays a prompt message, for example, a prompt of "authentication timeout, please re-authenticate", so that the user initiates the next account authentication as above.
The terminal pages or the application program pages related in the embodiment have no absolute sequence, and the appearance or the jump sequence of each page can be set or changed according to actual needs. The terminal page or the application page related in this embodiment may be a page that is displayed after the terminal or the application sends an account authentication request to the executing body and receives the request feedback information of the account authentication request sent by the executing body after the account authentication condition is triggered.
The present embodiment is further described by way of a generic example:
if the user D initiates the real-name authentication on the account E, the login terminal or the login application of the account E may display each interface for the user D to provide identity information and select an account authentication mode. If the user D selects the account auxiliary authentication mode, the login terminal or the login application program of the account E sends an account authentication instruction to an executing body (such as an authentication server or a service server), the executing body determines identification information according to the account authentication instruction, the identification information is the identity information, and whether an auxiliary authentication account corresponding to the identification information exists is determined. If the auxiliary authentication account corresponding to the identification information exists, for example, an account F, the execution body sends authentication information comprising a verification code to a registered mobile phone number of the account F, and sends an authentication feedback instruction to a login terminal or a login application program of the account E so that the login terminal or the login application program of the account E displays an authentication feedback page, and the authentication feedback page is used for filling the verification code. If the executing body acquires the authentication feedback information which is sent by the login terminal or the login application program of the account E and contains the verification code, the executing body compares whether the verification code in the authentication feedback information is identical with the verification code in the authentication information. If the account E authentication is the same, the account E authentication is passed, and if the account E authentication is not the same, the account E authentication is not passed.
The execution body may send the authentication result of the account E to the login terminal or the login application of the account E through the second authentication result information, so that the login terminal or the login application of the account E displays the authentication result. If the account E authentication is not passed, the login terminal or the login application program of the account E may also prompt to select other account authentication modes.
If the execution subject determines that the auxiliary authentication account does not exist, the execution subject transmits first authentication result information to the login terminal or the login application of the account E, so that the login terminal or the login application displays that the auxiliary authentication account does not exist and/or the login terminal or the login application prompts to select other account authentication modes.
In the embodiment, the account to be authenticated is authenticated through the trusted auxiliary authentication account, on one hand, the user does not need to collect biological characteristics including a human face, and the user does not need to provide various card information or account information, so that the account authentication efficiency can be improved, and the account authentication cost can be reduced; on the other hand, the risk of leakage or counterfeiting of biological characteristics or card information or account information is avoided, and the account authentication security can be improved; on the other hand, complicated steps of biological feature collection or card information or account information filling are avoided, convenience of account authentication can be improved, and account authentication effect is optimized.
In the embodiment, the auxiliary authentication account for performing account authentication is a trusted account, so that the account authentication security is improved; the authentication information is sent out through the available contact ways of the auxiliary authentication account, so that the authentication information is prevented from being stolen by users or main bodies except the auxiliary authentication account holder, and the account authentication security is further improved; determining an account authentication result by whether the authentication information is matched with the authentication feedback information, avoiding that an initiator of account authentication fills in the authentication feedback information at will or continuously tests to fill in the authentication feedback information to break through authentication, and further improving the security of account authentication; because the account to be authenticated corresponds to the same identification information as the auxiliary authentication account, as long as a user or a main body uses certain identification information to perform account authentication, the executing main body can determine the auxiliary authentication account corresponding to the identification information and send authentication information to the auxiliary authentication account, and the holder of the auxiliary authentication account can know that the identification information is being used for account authentication. If the user or the main body using the identification information to perform account authentication is not the holder of the auxiliary authentication account, the holder of the auxiliary authentication account can know that other users or main bodies use the identification information for account authentication, thereby helping the holder of the auxiliary authentication account to judge whether the identification information is leaked or stolen, and being beneficial to improving the account authentication security of the auxiliary authentication account holder and the identification information security.
A second embodiment (hereinafter referred to as "the present embodiment") of the present disclosure provides an account authentication method, where the execution subject of the present embodiment may be a terminal (including but not limited to a mobile phone, a computer, a pad, a television) or a server or an operating system or an account authentication platform or an account authentication system or an application program, that is, the execution subject may be various, and may be set, used, or changed according to needs. In addition, a third party application may also assist the execution body in executing the embodiment. For example, as shown in fig. 1, the account authentication method in the present embodiment may be performed by a server, and an application program corresponding to (the server) may be installed on a terminal (held by a user), data transmission may be performed between the terminal or the application program and the server, and data collection or input or output or page or information processing may be performed through the terminal or the application program, thereby assisting the server in performing the account authentication method in the present embodiment.
In particular, the execution subject (hereinafter referred to as "execution subject") of the present embodiment may be the terminal or the application program that issues the account authentication instruction in the first embodiment.
The account authentication method provided by the embodiment comprises the following steps:
s202: after the account authentication condition is triggered, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an identification information providing page is displayed; if the identification information is acquired, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated; or after the account authentication condition is triggered, displaying an identification information providing page; if the identification information is acquired, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated; wherein the account authentication instruction comprises account information to be authenticated and the identification information
In this embodiment, the authentication server may be the execution subject of the first embodiment.
The content of the first embodiment is content for performing account auxiliary authentication on an account to be authenticated, and the account authentication instruction is used for enabling the authentication server to perform account auxiliary authentication on the account to be authenticated, including: the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on an account to be authenticated according to the first embodiment.
S204: if the authentication feedback instruction sent by the authentication server is obtained, displaying an authentication feedback page, wherein the authentication feedback page is used for obtaining authentication feedback information; and if the authentication feedback information is acquired, the authentication feedback information is sent to the authentication server, and the authentication feedback information is used for the authentication server to judge whether the account to be authenticated passes authentication.
In this embodiment, if the executing body obtains the first authentication result information sent by the authentication server, a first authentication result page is displayed, where the first authentication result page is used to display a secondary authentication account determination result and/or is used to prompt selection of an account authentication mode other than account secondary authentication;
And/or the number of the groups of groups,
and if the execution body acquires second authentication result information sent by the authentication server, displaying a second authentication result page, wherein the second authentication result page is used for displaying an authentication result of the account to be authenticated and/or prompting to select an account authentication mode except account auxiliary authentication.
In this embodiment, no matter what account authentication method is selected by the user, if the executing body acquires authentication method selection data, the executing body determines a selected authentication method according to the authentication method selection data, and sends an account authentication instruction to the authentication server, where the account authentication instruction is used for the authentication server to execute the selected authentication method on the account to be authenticated.
Reference is made to the first embodiment for details not described in detail in this embodiment.
The present embodiment describes the account authentication method described above from a different execution subject point of view than the first embodiment, so that the present embodiment can achieve the same technical effects as the first embodiment.
As shown in fig. 10, a third embodiment of the present specification provides an account authentication apparatus, including:
the account determination module 301 is configured to determine, if an account authentication instruction corresponding to an account to be authenticated is acquired, identification information according to the account authentication instruction, and determine whether an auxiliary authentication account corresponding to the identification information exists;
The authentication initiating module 303 is configured to send out authentication information by using an available contact way of the auxiliary authentication account if the auxiliary authentication account corresponding to the identification information exists;
and the authentication determining module 305 is configured to determine whether the account to be authenticated passes authentication according to the authentication feedback information if the authentication feedback information sent by the issuing terminal or the issuing application program of the account authentication instruction is obtained.
Optionally, the account determination module 301 is further configured to: before judging whether the auxiliary authentication account corresponding to the identification information exists, determining an account authentication mode corresponding to the account to be authenticated according to the account authentication instruction.
Optionally, determining whether there is a secondary authentication account corresponding to the identification information includes:
if the account authentication mode corresponding to the account to be authenticated is determined to be an account auxiliary authentication mode, judging whether an auxiliary authentication account corresponding to the identification information exists or not.
Optionally, determining whether there is a secondary authentication account corresponding to the identification information includes:
determining an authenticated account corresponding to the identification information;
determining whether a secondary authentication account exists in the authenticated account.
Optionally, determining whether the secondary authentication account exists in the authenticated account includes:
judging whether each authenticated account accords with auxiliary authentication conditions according to account attribute data and/or account operation data of each authenticated account;
and taking the authenticated account meeting the auxiliary authentication condition as an auxiliary authentication account.
Optionally, determining whether each of the authenticated accounts meets the auxiliary authentication condition according to the account attribute data and/or the account operation data of each of the authenticated accounts includes:
scoring each authenticated account according to account attribute data and/or account operation data of each authenticated account;
and judging whether each authenticated account meets the auxiliary authentication condition according to the scoring score.
Optionally, sending the authentication information by using the available contact information of the auxiliary authentication account includes:
sending authentication information to the contact number of the auxiliary authentication account;
and/or the number of the groups of groups,
dialing a contact number of the auxiliary authentication account, and broadcasting authentication information after the contact number is connected;
and/or the number of the groups of groups,
and sending authentication information to the auxiliary authentication account.
Optionally, the authentication initiation module 303 is further configured to: and if the auxiliary authentication account corresponding to the identification information exists, sending an authentication feedback instruction to an issuing terminal or an issuing application program of the account authentication instruction so that the issuing terminal or the issuing application program displays an authentication feedback page, wherein the authentication feedback page is used for providing the authentication feedback information.
Optionally, the authentication determination module 305 is further configured to: and if the auxiliary authentication account corresponding to the identification information does not exist, sending first authentication result information to an issuing terminal or an issuing application program of the account authentication instruction so that the issuing terminal or the issuing application program displays auxiliary authentication account judgment results and/or prompts the issuing terminal or the issuing application program to select an account authentication mode except for account auxiliary authentication.
Optionally, the authentication determination module 305 is further configured to: and if the account to be authenticated is judged not to pass through according to the authentication feedback information, sending second authentication result information to an issuing terminal of the account authentication instruction so that the issuing terminal displays the authentication result of the account to be authenticated and/or prompts the issuing terminal to select an account authentication mode except account auxiliary authentication.
Optionally, the account determination module 301 is further configured to:
determining an account to be authenticated according to the account authentication instruction;
and/or the number of the groups of groups,
and determining the authentication content or the authentication form of the account to be authenticated according to the account authentication instruction.
Optionally, the identification information includes user identity information;
And/or the number of the groups of groups,
the authentication information comprises verification code information;
and/or the number of the groups of groups,
the authentication feedback information includes a verification code.
As shown in fig. 11, a fourth embodiment of the present specification provides an account authentication apparatus including:
the authentication request module 402 is configured to display an authentication mode selection page after triggering an account authentication condition, where the authentication mode selection page is used to select an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an identification information providing page is displayed; if the identification information is acquired, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated; or alternatively, the first and second heat exchangers may be,
after the account authentication condition is triggered, displaying an identification information providing page; if the identification information is acquired, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated;
The authentication feedback module 404 is configured to display an authentication feedback page if an authentication feedback instruction sent by the authentication server is obtained, where the authentication feedback page is used to obtain authentication feedback information; if the authentication feedback information is acquired, the authentication feedback information is sent to the authentication server, and the authentication feedback information is used for the authentication server to judge whether the account to be authenticated passes authentication or not;
the account authentication instruction comprises account information to be authenticated and the identification information.
Optionally, the authentication request module 402 is further configured to:
after the account authentication condition is triggered, taking the login account as an account to be authenticated when the account authentication condition is triggered;
and/or the number of the groups of groups,
after triggering the account authentication condition, displaying an account providing page, wherein the account providing page is used for acquiring an account to be authenticated;
and/or the number of the groups of groups,
and after the account authentication condition is triggered, displaying an authentication content selection page, wherein the authentication content selection page is used for selecting account authentication content.
Optionally, the authentication feedback module 404 is further configured to: if the first authentication result information sent by the authentication server is obtained, a first authentication result page is displayed, wherein the first authentication result page is used for displaying an auxiliary authentication account judgment result and/or prompting to select an account authentication mode except account auxiliary authentication;
And/or the number of the groups of groups,
and if the second authentication result information sent by the authentication server is obtained, displaying a second authentication result page, wherein the second authentication result page is used for displaying the authentication result of the account to be authenticated and/or prompting to select an account authentication mode except account auxiliary authentication.
Optionally, the authentication request module 402 is further configured to: if the authentication mode selection data is acquired, judging a selected authentication mode according to the authentication mode selection data;
and sending an account authentication instruction to the authentication server, wherein the account authentication instruction is used for the authentication server to execute the selected authentication mode on the account to be authenticated.
A fifth embodiment of the present specification provides an account authentication apparatus including:
at least one processor;
the method comprises the steps of,
a memory communicatively coupled to the at least one processor;
wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the account authentication method of the first or second embodiments.
A sixth embodiment of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, implement the account authentication method of the first or second embodiment.
The embodiments described above may be combined, and modules having the same names between different embodiments or within the same embodiment may be the same or different modules.
The foregoing describes certain embodiments of the present disclosure, other embodiments being within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. Furthermore, the processes depicted in the accompanying drawings do not necessarily have to be in the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for apparatus, devices, non-transitory computer readable storage medium embodiments, the description is relatively simple, as it is substantially similar to method embodiments, with reference to portions of the description of method embodiments being relevant.
The apparatus, the device, the nonvolatile computer readable storage medium and the method provided in the embodiments of the present disclosure correspond to each other, and therefore, the apparatus, the device, and the nonvolatile computer storage medium also have similar advantageous technical effects as those of the corresponding method, and since the advantageous technical effects of the method have been described in detail above, the advantageous technical effects of the corresponding apparatus, device, and nonvolatile computer storage medium are not described herein again.
In the 90 s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable Gate Array, FPGA)) is an integrated circuit whose logic function is determined by the programming of the device by a user. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented by using "logic compiler" software, which is similar to the software compiler used in program development and writing, and the original code before the compiling is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but not just one of the hdds, but a plurality of kinds, such as ABEL (Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), lava, lola, myHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in one or more software and/or hardware elements when implemented in the present specification.
It will be appreciated by those skilled in the art that the present description may be provided as a method, system, or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description embodiments may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present description is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing is merely exemplary embodiments of the present disclosure and is not intended to limit the present disclosure. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.
Claims (21)
1. An account authentication method, comprising:
if an account authentication instruction corresponding to an account to be authenticated is acquired, judging whether an auxiliary authentication account corresponding to the account to be authenticated exists or not; the account to be authenticated and the auxiliary authentication account are accounts held by the same user;
if yes, sending out authentication information by using the available contact ways of the auxiliary authentication account;
if the authentication feedback information sent by the sending terminal or the sending application program of the account authentication instruction is obtained, whether the account to be authenticated passes authentication is judged according to the authentication feedback information.
2. The method of claim 1, wherein the determining whether a secondary authentication account corresponding to the account to be authenticated exists specifically comprises;
determining the identification information of the account to be authenticated according to the account authentication instruction;
and judging whether a secondary authentication account corresponding to the identification information exists or not.
3. The method of claim 2, the method further comprising, prior to determining whether there is a secondary authentication account corresponding to the identification information:
determining an account authentication mode corresponding to the account to be authenticated according to the account authentication instruction;
if the account authentication mode corresponding to the account to be authenticated is determined to be an account auxiliary authentication mode, judging whether an auxiliary authentication account corresponding to the identification information exists or not.
4. The method of claim 2, wherein the determining whether the auxiliary authentication account corresponding to the identification information exists specifically comprises:
determining an authenticated account corresponding to the identification information;
determining whether a secondary authentication account exists in the authenticated account.
5. The method of claim 4, wherein determining whether a secondary authentication account exists in the authenticated account comprises:
Judging whether each authenticated account accords with auxiliary authentication conditions according to account attribute data and/or account operation data of each authenticated account;
and taking the authenticated account meeting the auxiliary authentication condition as an auxiliary authentication account.
6. The method of claim 5, wherein the determining whether each of the authenticated accounts meets the auxiliary authentication condition according to the account attribute data and/or the account operation data of each of the authenticated accounts comprises:
scoring each authenticated account according to account attribute data and/or account operation data of each authenticated account;
and judging whether each authenticated account meets the auxiliary authentication condition according to the scoring score.
7. The method of claim 2, the method further comprising:
and if the auxiliary authentication account corresponding to the identification information exists, sending an authentication feedback instruction to an issuing terminal or an issuing application program of the account authentication instruction so that the issuing terminal or the issuing application program displays an authentication feedback page, wherein the authentication feedback page is used for providing the authentication feedback information.
8. The method of claim 1, wherein the issuing authentication information using the available contact information of the auxiliary authentication account specifically comprises:
Sending authentication information to the contact number of the auxiliary authentication account;
and/or the number of the groups of groups,
dialing a contact number of the auxiliary authentication account, and broadcasting authentication information after the contact number is connected;
and/or the number of the groups of groups,
and sending authentication information to the auxiliary authentication account.
9. The method of any one of claims 2 to 8, the method further comprising:
and if the auxiliary authentication account corresponding to the identification information does not exist, sending first authentication result information to an issuing terminal or an issuing application program of the account authentication instruction so that the issuing terminal or the issuing application program displays auxiliary authentication account judgment results and/or prompts the issuing terminal or the issuing application program to select an account authentication mode except for account auxiliary authentication.
10. The method of any one of claims 1 to 8, the method further comprising:
and if the account to be authenticated is judged not to pass through according to the authentication feedback information, sending second authentication result information to an issuing terminal or an issuing application program of the account authentication instruction so that the issuing terminal or the issuing application program displays the authentication result of the account to be authenticated and/or prompts the issuing terminal or the issuing application program to select an account authentication mode except account auxiliary authentication.
11. The method of any one of claims 1 to 8, the method further comprising:
determining an account to be authenticated according to the account authentication instruction;
and/or the number of the groups of groups,
and determining the authentication content or the authentication form of the account to be authenticated according to the account authentication instruction.
12. The method of any of claims 2 to 8, the identification information comprising user identity information;
and/or the number of the groups of groups,
the authentication information comprises verification code information or other information with verification and authentication functions;
and/or the number of the groups of groups,
the authentication feedback information includes a verification code.
13. An account authentication method, comprising:
after the account authentication condition is triggered, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode;
if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an identification information providing page is displayed;
if the identification information is acquired, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated; the account to be authenticated and the auxiliary authentication account for executing the account auxiliary authentication are accounts held by the same user;
Or alternatively, the first and second heat exchangers may be,
after the account authentication condition is triggered, displaying an identification information providing page;
if the identification information is acquired, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode;
if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated;
the method further comprises the steps of: if an authentication feedback instruction sent by the authentication server is obtained, displaying an authentication feedback page, wherein the authentication feedback page is used for obtaining authentication feedback information;
if the authentication feedback information is acquired, the authentication feedback information is sent to the authentication server, and the authentication feedback information is used for the authentication server to judge whether the account to be authenticated passes authentication or not;
the account authentication instruction comprises account information to be authenticated and the identification information.
14. The method of claim 13, the method further comprising:
after the account authentication condition is triggered, taking the login account as an account to be authenticated when the account authentication condition is triggered;
And/or the number of the groups of groups,
after triggering the account authentication condition, displaying an account providing page, wherein the account providing page is used for acquiring an account to be authenticated;
and/or the number of the groups of groups,
and after the account authentication condition is triggered, displaying an authentication content selection page, wherein the authentication content selection page is used for selecting account authentication content.
15. The method of claim 13, the method further comprising:
if the first authentication result information sent by the authentication server is obtained, a first authentication result page is displayed, wherein the first authentication result page is used for displaying an auxiliary authentication account judgment result and/or prompting to select an account authentication mode except account auxiliary authentication;
and/or the number of the groups of groups,
and if the second authentication result information sent by the authentication server is obtained, displaying a second authentication result page, wherein the second authentication result page is used for displaying the authentication result of the account to be authenticated and/or prompting to select an account authentication mode except account auxiliary authentication.
16. The method of any one of claims 13 to 15, the method further comprising:
if the authentication mode selection data is acquired, judging a selected authentication mode according to the authentication mode selection data;
And sending an account authentication instruction to the authentication server, wherein the account authentication instruction is used for the authentication server to execute the selected authentication mode on the account to be authenticated.
17. An account authentication device, comprising:
the account judgment module is used for judging whether an auxiliary authentication account corresponding to the account to be authenticated exists or not if an account authentication instruction corresponding to the account to be authenticated is acquired; the account to be authenticated and the auxiliary authentication account are accounts held by the same user;
the authentication initiating module is used for sending authentication information by utilizing the available contact ways of the auxiliary authentication account if the auxiliary authentication account corresponding to the identification information exists;
and the authentication judging module is used for judging whether the account to be authenticated passes authentication according to the authentication feedback information if the authentication feedback information sent by the issuing terminal or the issuing application program of the account authentication instruction is obtained.
18. The account authentication device of claim 17, the account determination module comprising:
the determining unit is used for determining the identification information of the account to be authenticated according to the account authentication instruction;
and the judging unit is used for judging whether the auxiliary authentication account corresponding to the identification information exists or not.
19. An account authentication device, comprising:
the authentication request module is used for displaying an authentication mode selection page after the account authentication condition is triggered, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an identification information providing page is displayed; if the identification information is acquired, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated; the account to be authenticated and the auxiliary authentication account for executing the account auxiliary authentication are accounts held by the same user;
or alternatively, the first and second heat exchangers may be,
after the account authentication condition is triggered, displaying an identification information providing page; if the identification information is acquired, displaying an authentication mode selection page, wherein the authentication mode selection page is used for selecting an account authentication mode; if authentication mode selection data are acquired, and the account auxiliary authentication mode is judged to be selected according to the authentication mode selection data, an account authentication instruction is sent to an authentication server, wherein the account authentication instruction is used for enabling the authentication server to execute account auxiliary authentication on the account to be authenticated;
The authentication feedback module is used for displaying an authentication feedback page if an authentication feedback instruction sent by the authentication server is acquired, wherein the authentication feedback page is used for acquiring authentication feedback information; if the authentication feedback information is acquired, the authentication feedback information is sent to the authentication server, and the authentication feedback information is used for the authentication server to judge whether the account to be authenticated passes authentication or not;
the account authentication instruction comprises account information to be authenticated and the identification information.
20. An account authentication device, comprising:
at least one processor;
the method comprises the steps of,
a memory communicatively coupled to the at least one processor;
wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the account authentication method of any one of claims 1 to 12 or 13 to 16.
21. A computer readable storage medium storing computer executable instructions which when executed by a processor implement the account authentication method of any one of claims 1 to 12 or 13 to 16.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310320502.1A CN116436655A (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310320502.1A CN116436655A (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
CN202110146110.9A CN112910896B (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110146110.9A Division CN112910896B (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116436655A true CN116436655A (en) | 2023-07-14 |
Family
ID=76122570
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110146110.9A Active CN112910896B (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
CN202310320502.1A Pending CN116436655A (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110146110.9A Active CN112910896B (en) | 2021-02-02 | 2021-02-02 | Account authentication method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN112910896B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113434871B (en) * | 2021-07-15 | 2023-03-14 | 支付宝(杭州)信息技术有限公司 | Information leakage detection method, device and equipment |
CN113674085A (en) * | 2021-08-19 | 2021-11-19 | 支付宝(杭州)信息技术有限公司 | Account limitation-removing method, device and equipment |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030018915A1 (en) * | 2001-07-19 | 2003-01-23 | Louis Stoll | Method and system for user authentication and authorization of services |
US9071422B2 (en) * | 2011-04-20 | 2015-06-30 | Innodis Co., Ltd. | Access authentication method for multiple devices and platforms |
CN102780708A (en) * | 2012-08-17 | 2012-11-14 | 广东利为网络科技有限公司 | Remote assistant login method and system |
CN109617860B (en) * | 2016-01-13 | 2021-10-22 | 创新先进技术有限公司 | Real-name authentication method and device for account |
CN108449340A (en) * | 2017-12-28 | 2018-08-24 | 齐爱民 | Identity identifying method based on account information and its Verification System |
CN109981626A (en) * | 2019-03-11 | 2019-07-05 | 新华三信息安全技术有限公司 | A kind of account authentication method and device |
CN112383519A (en) * | 2019-06-18 | 2021-02-19 | 创新先进技术有限公司 | Enterprise authentication and authentication tracing method, device and equipment based on block chain |
CN111652623A (en) * | 2020-05-29 | 2020-09-11 | 支付宝(杭州)信息技术有限公司 | Frozen account unfreezing data processing method, device and equipment |
CN111784354A (en) * | 2020-07-16 | 2020-10-16 | 支付宝(杭州)信息技术有限公司 | Data processing method, server, terminal and system for assisting unfreezing of frozen account |
-
2021
- 2021-02-02 CN CN202110146110.9A patent/CN112910896B/en active Active
- 2021-02-02 CN CN202310320502.1A patent/CN116436655A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN112910896B (en) | 2023-04-07 |
CN112910896A (en) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11310281B2 (en) | Systems and methods for monitoring computer authentication procedures | |
US7930264B2 (en) | Multi-module authentication platform | |
US20080192901A1 (en) | Digital Process and Arrangement for Authenticating a User of a Telecommunications or Data Network | |
CN112785309B (en) | Payment code generation method, mobile payment method, device and equipment | |
CN110245928B (en) | Method, system and equipment for acquiring signing key element information of bank card | |
CN109600525A (en) | The control method and device of call center based on virtual reality | |
CN118798876A (en) | Payment method, device, equipment and medium based on near field communication | |
CN108960839B (en) | Payment method and device | |
US20090007245A1 (en) | System and method for controlled content access on mobile devices | |
CN110276178B (en) | Risk control method, device and equipment based on identity verification | |
CN112910896B (en) | Account authentication method, device, equipment and medium | |
CN106878244B (en) | Authenticity certification information providing method and device | |
CN109523268A (en) | Payment system, payment method, and second client apparatus | |
Singanamalla et al. | PocketATM: understanding and improving ATM accessibility in India | |
WO2022237572A1 (en) | Payment method and apparatus, and device | |
CN109615391A (en) | Payment system, payment method, and second client apparatus | |
CN114268461A (en) | User identity authentication method, device, server, terminal and storage medium | |
CN106201153B (en) | Operation entry display method and device | |
CN109493078A (en) | Payment system, payment method, and second client apparatus | |
CN106910055A (en) | A kind of payment data treating method and apparatus based on mobile terminal | |
CN111611571A (en) | Real-name authentication method and device | |
WO2009154635A1 (en) | System and method for controlled content access on mobile devices | |
CN111539742B (en) | Information processing method, information processing device, electronic equipment and storage medium | |
CN110321752B (en) | Method and device for checking offline graphic codes | |
CN109447655A (en) | Payment system, payment method, and second client apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |