CN117454338A - Self-service identity registration and identity authentication method - Google Patents

Self-service identity registration and identity authentication method Download PDF

Info

Publication number
CN117454338A
CN117454338A CN202311413624.1A CN202311413624A CN117454338A CN 117454338 A CN117454338 A CN 117454338A CN 202311413624 A CN202311413624 A CN 202311413624A CN 117454338 A CN117454338 A CN 117454338A
Authority
CN
China
Prior art keywords
identity
user
registration
authentication
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311413624.1A
Other languages
Chinese (zh)
Inventor
李家奇
宫保金
李亚洲
李江坤
李会强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur General Software Co Ltd
Original Assignee
Inspur General Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur General Software Co Ltd filed Critical Inspur General Software Co Ltd
Priority to CN202311413624.1A priority Critical patent/CN117454338A/en
Publication of CN117454338A publication Critical patent/CN117454338A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The invention relates to the technical field of identity recognition, in particular to a self-service identity registration and identity authentication method, a self-service identity registration and identity authentication system, computer equipment and a storage medium. The method receives request data, intercepts and identifies the request data, extracts Token in the request data, and analyzes the Token in validity to confirm whether the user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.

Description

Self-service identity registration and identity authentication method
Technical Field
The present invention relates to the field of identity recognition technologies, and in particular, to a self-service identity registration and identity authentication method, system, computer device, and storage medium.
Background
Identity verification, also referred to as "identity authentication" or "identity authentication", refers to the process of verifying the identity of an operator in a computer and a computer network system, so as to determine whether the user has access and use rights to a certain resource, thereby enabling the access policies of the computer and the network system to be reliably and effectively executed, preventing an attacker from impersonating a legitimate user to obtain the access rights of the resource, ensuring the security of the system and data, and authorizing the legitimate interests of the visitor.
Traditional identity authentication technology has been gradually overridden and replaced from the aspects of standard type, security and usability, and the traditional identity authentication method comprises the following steps: passwords, tokens, and certificate keys, etc. In the conventional password identification method, a user does not pay attention to enough potential safety hazards when setting the password, so that an identity card number, a birthday or a telephone number and the like are simply used, the password is confused or even lost, and the traditional identity authentication mode has larger potential hazards.
With the continuous development of society, more places need to use identity authentication, the traditional identity authentication method cannot meet the wide demands, more systems need to realize no artificial reform, and autonomous registration and identity authentication of users are very important.
In the traditional ERP identity authentication mode, when a user logs in an ERP system for the first time, if no account information matched with the user is available, the identity authentication cannot be completed, and therefore the ERP system cannot be used.
Disclosure of Invention
In order to solve the technical problems in the prior art, the invention provides a self-service identity registration and identity authentication method, a self-service identity registration and identity authentication system, computer equipment and a storage medium.
In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
in a first aspect, in one embodiment provided by the present invention, a self-service identity registration and identity authentication method is provided, the method comprising the steps of:
s10, receiving request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
s20, if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation;
s30, when the user logs in again after the identity is established, returning to the step S10 to perform secondary synchronization check.
The invention accepts request data, intercepts and identifies the request data, extracts Token in the request data, and analyzes the Token in validity to confirm whether the user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.
As a further aspect of the invention, token exists in browser cookies.
As a further aspect of the present invention, if the user does not complete the identity authentication, guiding the user to complete the identity authentication, further includes:
when the identity authentication system judges that the identity of the current user exists, access is refused if the identity authentication information is wrong;
if the authentication information is correct, access is allowed.
When the system guides the user to go to the identity registration page to carry out identity registration, the user is required to provide necessary information required by identity authentication and the system, the identity registration is carried out after the user information is perfected, the system creates a user account according to the identity information, and information binding is completed, so that the system can log in after the identity authentication.
As a further scheme of the invention, if the user is judged to be logged in for the first time, the user is guided to go to an identity registration page to carry out identity registration so as to complete identity creation, and the method further comprises the following steps:
when the identity registration is carried out, encryption processing or desensitization processing is carried out on the sensitive information.
As a further scheme of the invention, if the user is judged to be logged in for the first time, the user is guided to go to an identity registration page to carry out identity registration so as to complete identity creation, and the method further comprises the following steps:
when the identity registration is carried out, the identity registration is required to be subjected to side blasting treatment.
In a second aspect, in yet another embodiment provided by the present invention, there is provided a self-service identity registration and authentication system comprising: the system comprises a data receiving module, an identity verification registering module and a judging and transferring-out module;
the data receiving module is used for receiving the request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
the identity authentication registration module is used for guiding the user to complete identity authentication if the user does not complete identity authentication, and guiding the user to go to an identity registration page to perform identity registration if the identity authentication system judges that the current user identity does not exist and judges that the user logs in for the first time so as to complete identity creation;
and the judging and transferring module is used for returning to the data receiving module for secondary synchronous check when the user logs in again after completing the identity creation.
As a further scheme of the invention, the identity authentication registration module is further used for rejecting access if the identity authentication information is wrong when the identity authentication system determines that the current user identity exists; if the authentication information is correct, access is allowed.
As a further scheme of the invention, the identity authentication registration module is also used for encrypting or desensitizing the sensitive information when the identity is registered.
In a third aspect, in yet another embodiment provided by the present invention, a computer device is provided, including a memory and a processor, the memory storing a computer program, the processor implementing the steps of the self-service identity registration and authentication method when the computer program is loaded and executed.
In a fourth aspect, in a further embodiment the present invention provides a storage medium storing a computer program which when loaded and executed by a processor performs the steps of the self-service identity registration and authentication method.
The technical scheme provided by the invention has the following beneficial effects:
the self-service identity registration and identity authentication method, the self-service identity registration and identity authentication system, the computer equipment and the storage medium provided by the invention are characterized in that the method receives request data, intercepts and identifies the request data, extracts Token in the request data, and performs validity analysis on Token to confirm whether a user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.
These and other aspects of the invention will be more readily apparent from the following description of the embodiments. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention as claimed.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention and that other embodiments may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a self-service identity registration and authentication method according to one embodiment of the present invention.
FIG. 2 is a block diagram illustrating a self-service identity registration and authentication system according to one embodiment of the present invention.
In the figure: the system comprises a data receiving module-100, an identity verification registering module-200 and a judging and transferring-out module-300.
Detailed Description
Various embodiments and/or aspects are described below with reference to the accompanying drawings. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of one or more aspects. However, it will be understood by those skilled in the art that the aspects may be practiced without the specific details. Specific examples of one or more aspects will be described in detail below with reference to the accompanying drawings. However, these aspects are illustrative, and some of the various methods in which the principles of the various aspects may be utilized, and the description set forth is intended to include all aspects and their equivalents. In particular, the terms "embodiment," "example," "modality," "illustration," and the like as used in this specification may be construed as describing any modality or design that may be better or have advantages than other modalities or designs.
In addition, the various aspects and features may be embodied in systems that include more than one device, terminal, server, apparatus, component, and/or module, etc. It is to be understood and appreciated that the various systems may include additional pluralities of devices, terminals, servers, apparatus, components, and/or modules, and/or may not include all of the pluralities of devices, terminals, servers, apparatus, components, modules, etc. shown in the figures.
The terms "computer program," "component," "module," "system," and the like are used interchangeably herein and refer to a computer-related entity, hardware, firmware, software, a combination of software and hardware, or execution of software. For example, a component may be, but is not limited to being, a process executing on a processor, an object, a thread of execution, a program, and/or a computer. For example, it may be an application executing on a computer device and/or all components of a computing device. More than one component may be installed within a processor and/or thread of execution. A component may be localized in one computer. A component may also be distributed between more than two computers.
Also, these components can execute from various computer readable media having various data structures stored therein. These components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data transmitted by one component interacting with another component in a local system, distributed system, and across a network such as the internet with the other system by way of the signal).
Hereinafter, the same reference numerals are given to the same or similar components irrespective of the drawing symbols, and a repetitive description thereof will be omitted. In the description of the embodiments disclosed in the present specification, if it is determined that the detailed description of the known technology makes the gist of the present invention unclear, detailed description thereof will be omitted. The drawings are only for easier understanding of the embodiments disclosed in the present specification, and the technical ideas disclosed in the present specification are not limited to the drawings.
The terminology used in the description is for the purpose of describing the embodiments only and is not intended to be limiting of the invention. Where not specifically mentioned, singular references in this specification include plural references. The inclusion and/or inclusion of components in the specification do not preclude the presence or addition of one or more other components.
The terms first, second, etc. may be used to describe various elements or components, but the elements or components are not limited to the terms. The term is used to distinguish one element or component from another element or component. Therefore, the first element or component mentioned below may be the 2 nd element or component within the technical idea of the present invention.
Unless defined otherwise, all terms (including technical and scientific terms) used in this specification have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. In addition, terms defined in a dictionary generally used should not be interpreted in an idealized or overdecommenced manner unless specifically defined.
In addition, the term "or" is not intended to be exclusive "or" but rather is inclusive. That is, "X employs A or B" means one of the substitutions of natural connotation unless otherwise specifically or contextually ambiguous. That is, X utilizes A or; when X is B or X is A and B, the "X is A or B" may be any of the above. Also, it should be understood that the term "and/or" as used in this specification refers to all possible combinations of more than one of the items included in the list of related items.
In addition, the terms "information" and "data" are generally used interchangeably in this specification.
The suffixes "module" and "part" for the constituent elements used in the following description are given or used for convenience of writing the description, and do not have mutually distinguishing meanings or roles.
Identity verification, also referred to as "identity authentication" or "identity authentication", refers to the process of verifying the identity of an operator in a computer and a computer network system, so as to determine whether the user has access and use rights to a certain resource, thereby enabling the access policies of the computer and the network system to be reliably and effectively executed, preventing an attacker from impersonating a legitimate user to obtain the access rights of the resource, ensuring the security of the system and data, and authorizing the legitimate interests of the visitor.
In the traditional ERP identity authentication mode, when a user logs in an ERP system for the first time, if no account information matched with the user is available, the identity authentication cannot be completed, and therefore the ERP system cannot be used. The invention provides a self-service identity registration method, namely when a user logs in an ERP system for the first time, if no account information matched with the user exists, the self-service identity registration can be automatically completed, so that identity authentication is completed, the user logs in the system, and the self-service identity registration and identity authentication method, the self-service identity registration system, computer equipment and storage media are provided for solving the technical problem.
In particular, embodiments of the present invention are further described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of a self-service identity registration and identity authentication method according to an embodiment of the present invention, as shown in fig. 1, the self-service identity registration and identity authentication method includes steps S10 to S30.
S10, receiving request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
in an embodiment of the present invention, the Token exists in a browser Cookie.
S20, if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation;
in an embodiment of the present invention, if the user does not complete the identity authentication, guiding the user to complete the identity authentication further includes:
when the identity authentication system judges that the identity of the current user exists, access is refused if the identity authentication information is wrong;
if the authentication information is correct, access is allowed.
When the system guides the user to go to the identity registration page to carry out identity registration, the user is required to provide necessary information required by identity authentication and the system, the identity registration is carried out after the user information is perfected, the system creates a user account according to the identity information, and information binding is completed, so that the system can log in after the identity authentication.
In the embodiment of the invention, if the user is judged to be logged in for the first time, the user is guided to go to the identity registration page to carry out identity registration so as to complete the identity creation, and the method further comprises the following steps:
when the identity registration is carried out, encryption processing or desensitization processing is carried out on the sensitive information.
In the embodiment of the invention, if the user is judged to be logged in for the first time, the user is guided to go to the identity registration page to carry out identity registration so as to complete the identity creation, and the method further comprises the following steps:
when the identity registration is carried out, the identity registration is required to be subjected to side blasting treatment, for example, a graphic verification code, a short message verification code and the like are relied on.
The identity registration checks whether pre-registration information exists, such as a graphic verification code, a short message verification code and the like:
boolean matchesPreBindingRequest(HttpServletRequest var1);
identity pre-registration:
void preBind(HttpServletRequest var1,HttpServletResponse var2);
checking if pre-registration is required:
boolean matchesBindingRequest(HttpServletRequest var1);
identity registration:
UserDetails bind(HttpServletRequest var1,UserDetails var2);
address after registration success:
String getRedirectUri();
register address:
String getBindingSuccessUri()。
s30, when the user logs in again after the identity is established, returning to the step S10 to perform secondary synchronization check.
The invention accepts request data, intercepts and identifies the request data, extracts Token in the request data, and analyzes the Token in validity to confirm whether the user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.
It should be understood that although described in a certain order, the steps are not necessarily performed sequentially in the order described. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, some steps of the present embodiment may include a plurality of steps or stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily sequential, but may be performed alternately or alternately with at least a part of the steps or stages in other steps or other steps.
In one embodiment, referring to fig. 2, a self-service identity registration and authentication system is also provided in an embodiment of the present invention, which includes a data receiving module 100, an authentication registration module 200, and a judgment turning-out module 300.
The data receiving module 100 is configured to receive the request data, intercept and identify the request data, extract Token in the request data, and perform validity analysis on the Token to confirm whether the user has completed identity authentication.
In an embodiment of the present invention, the Token exists in a browser Cookie.
The identity authentication registration module 200 is configured to guide the user to complete identity authentication if the user does not complete identity authentication, and guide the user to go to the identity registration page to perform identity registration if the identity authentication system determines that the current user identity does not exist and determines that the user is logged in for the first time, so as to complete identity creation.
In the embodiment of the present invention, the authentication registration module 200 is further configured to, when the authentication system determines that the current user identity exists, deny access if the authentication information is wrong; if the authentication information is correct, access is allowed.
When the system guides the user to go to the identity registration page to carry out identity registration, the user is required to provide necessary information required by identity authentication and the system, the identity registration is carried out after the user information is perfected, the system creates a user account according to the identity information, and information binding is completed, so that the system can log in after the identity authentication.
In the embodiment of the present invention, the authentication registration module 200 is further configured to encrypt or desensitize sensitive information when performing identity registration.
In the embodiment of the present invention, the authentication registration module 200 is further configured to require a side blasting process to be performed on the identity registration, for example, relying on a graphic authentication code, a short message authentication code, and the like, when performing the identity registration.
When the identity registration is carried out, the identity registration is required to be subjected to side blasting treatment, for example, a graphic verification code, a short message verification code and the like are relied on.
The identity registration checks whether pre-registration information exists, such as a graphic verification code, a short message verification code and the like:
boolean matchesPreBindingRequest(HttpServletRequest var1);
identity pre-registration:
void preBind(HttpServletRequest var1,HttpServletResponse var2);
checking if pre-registration is required:
boolean matchesBindingRequest(HttpServletRequest var1);
identity registration:
UserDetails bind(HttpServletRequest var1,UserDetails var2);
address after registration success:
String getRedirectUri();
register address:
String getBindingSuccessUri()。
the judgment turning-out module 300 is configured to return to the data receiving module 100 for secondary synchronization check when the user logs in again after completing the identity creation.
The invention accepts request data, intercepts and identifies the request data, extracts Token in the request data, and analyzes the Token in validity to confirm whether the user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.
In one embodiment, a computer device is also provided in an embodiment of the present invention, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory communicate with each other via the communication bus.
A memory for storing a computer program;
the processor is used for executing the self-service identity registration and identity authentication method when executing the computer program stored in the memory, and the steps in the embodiment of the method are realized when the processor executes the instructions:
s10, receiving request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
s20, if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation;
s30, when the user logs in again after the identity is established, returning to the step S10 to perform secondary synchronization check.
The invention accepts request data, intercepts and identifies the request data, extracts Token in the request data, and analyzes the Token in validity to confirm whether the user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.
The communication bus mentioned by the above terminal may be a peripheral component interconnect standard (Peripheral ComponentInterconnect, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry StandardArchitecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the terminal and other devices.
The memory may include random access memory (Random Access Memory, RAM) or non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU for short), a network processor (Network Processor, NP for short), etc.; but also digital signal processors (Digital Signal Processing, DSP for short), application specific integrated circuits (Application SpecificIntegrated Circuit, ASIC for short), field-programmable gate arrays (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
The computer device includes a user device and a network device. Wherein the user equipment includes, but is not limited to, a computer, a smart phone, a PDA, etc.; the network device includes, but is not limited to, a single network server, a server group of multiple network servers, or a Cloud based Cloud Computing (Cloud Computing) consisting of a large number of computers or network servers, where Cloud Computing is one of distributed Computing, and is a super virtual computer consisting of a group of loosely coupled computer sets. The computer device can be used for realizing the invention by running alone, and can also be accessed into a network and realized by interaction with other computer devices in the network. Wherein the network where the computer device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, and the like.
It should also be understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
In one embodiment of the present invention there is also provided a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method embodiments described above:
s10, receiving request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
s20, if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation;
s30, when the user logs in again after the identity is established, returning to the step S10 to perform secondary synchronization check.
The invention provides a self-service identity registration and identity authentication method, a self-service identity registration and identity authentication system, computer equipment and a storage medium, wherein the self-service identity registration and identity authentication method comprises the steps of receiving request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on Token to confirm whether a user has completed identity authentication; if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation; when the user logs in again after completing the identity creation, returning to the step S10 to perform secondary synchronous check; the invention expands the software identity authentication mode, increases the autonomous registration mechanism, reduces manual operation and improves the usability of software.
Those skilled in the art will appreciate that implementing all or part of the above described embodiment methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the above described embodiment methods. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory.
It should be understood that as used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items. The foregoing embodiment of the present invention has been disclosed with reference to the number of embodiments for the purpose of description only, and does not represent the advantages or disadvantages of the embodiments.
Those of ordinary skill in the art will appreciate that: the above discussion of any embodiment is merely exemplary and is not intended to imply that the scope of the disclosure of embodiments of the invention, including the claims, is limited to such examples; combinations of features of the above embodiments or in different embodiments are also possible within the idea of an embodiment of the invention, and many other variations of the different aspects of the embodiments of the invention as described above exist, which are not provided in detail for the sake of brevity. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the embodiments should be included in the protection scope of the embodiments of the present invention.

Claims (10)

1. A self-service identity registration and identity authentication method, the method comprising:
s10, receiving request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
s20, if the user does not complete identity authentication, guiding the user to complete identity authentication, if the identity authentication system judges that the current user identity does not exist, and judges that the user logs in for the first time, guiding the user to go to an identity registration page for identity registration so as to complete identity creation;
s30, when the user logs in again after the identity is established, returning to the step S10 to perform secondary synchronization check.
2. The self-service identity registration and authentication method of claim 1, wherein Token exists in a browser Cookie.
3. The self-service identity registration and authentication method as claimed in claim 1, wherein if the user does not complete the identity authentication, guiding the user to complete the identity authentication, further comprising:
when the identity authentication system judges that the identity of the current user exists, access is refused if the identity authentication information is wrong;
if the authentication information is correct, access is allowed.
4. The self-service identity registration and identity authentication method as claimed in claim 3, wherein if it is determined that the user is logged in for the first time, the user is guided to go to the identity registration page to perform identity registration to complete identity creation, further comprising:
when the identity registration is carried out, encryption processing or desensitization processing is carried out on the sensitive information.
5. The self-service identity registration and identity authentication method as claimed in claim 4, wherein if it is determined that the user is logged in for the first time, the user is guided to go to the identity registration page to perform identity registration to complete identity creation, further comprising:
when the identity registration is carried out, the identity registration is required to be subjected to side blasting treatment.
6. A self-service identity registration and authentication system, the system comprising: the system comprises a data receiving module, an identity verification registering module and a judging and transferring-out module;
the data receiving module is used for receiving the request data, intercepting and identifying the request data, extracting Token in the request data, and carrying out validity analysis on the Token to confirm whether the user has completed identity authentication;
the identity authentication registration module is used for guiding the user to complete identity authentication if the user does not complete identity authentication, and guiding the user to go to an identity registration page to perform identity registration if the identity authentication system judges that the current user identity does not exist and judges that the user logs in for the first time so as to complete identity creation;
and the judging and transferring module is used for returning to the data receiving module for secondary synchronous check when the user logs in again after completing the identity creation.
7. The self-service identity registration and authentication system of claim 6 wherein the authentication registration module is further configured to deny access if the authentication information is incorrect when the authentication system determines that the current user identity is present; if the authentication information is correct, access is allowed.
8. The self-service identity registration and authentication system of claim 6 wherein the authentication registration module is further configured to encrypt or desensitize sensitive information during identity registration.
9. A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the self-service identity registration and authentication method of any one of claims 1-5 when the computer program is loaded and executed.
10. A storage medium storing a computer program which, when loaded and executed by a processor, carries out the steps of a self-service identity registration and authentication method according to any one of claims 1 to 5.
CN202311413624.1A 2023-10-27 2023-10-27 Self-service identity registration and identity authentication method Pending CN117454338A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311413624.1A CN117454338A (en) 2023-10-27 2023-10-27 Self-service identity registration and identity authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311413624.1A CN117454338A (en) 2023-10-27 2023-10-27 Self-service identity registration and identity authentication method

Publications (1)

Publication Number Publication Date
CN117454338A true CN117454338A (en) 2024-01-26

Family

ID=89581213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311413624.1A Pending CN117454338A (en) 2023-10-27 2023-10-27 Self-service identity registration and identity authentication method

Country Status (1)

Country Link
CN (1) CN117454338A (en)

Similar Documents

Publication Publication Date Title
US20200304491A1 (en) Systems and methods for using imaging to authenticate online users
US9560033B2 (en) Method and system for authenticating user identity
US7162456B2 (en) Method for private personal identification number management
US20080066165A1 (en) Method, system and program product for authenticating a user seeking to perform an electronic service request
CN106575281B (en) System and method for implementing hosted authentication services
CN101221641B (en) On-line trading method and its safety affirmation equipment
WO2020181809A1 (en) Data processing method and system based on interface checking, and computer device
US8577811B2 (en) In-band transaction verification
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
CN107682336B (en) Geographic position-based identity authentication method and device
CN102073822A (en) Method and system for preventing user information from leaking
CN111191212B (en) Block chain-based digital certificate processing method, device, equipment and storage medium
US7596531B2 (en) Method and apparatus for protecting against side channel attacks against personal identification numbers
CN106878319A (en) A kind of method and system that Digital signature service is provided
CN111832005A (en) Application authorization method, application authorization device and electronic equipment
KR20170059359A (en) Verification mehod and appratus based on security tunnel
US7167843B2 (en) Apparatus for private personal identification number management
CN113014576A (en) Service authority control method, device, server and storage medium
CN111581616B (en) Multi-terminal login control method and device
WO2018098699A1 (en) Transaction processing method and device
Mandalapu et al. An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies
CN103929310A (en) Mobile phone client side password unified authentication method and system
CN110546668B (en) Dynamic authentication method and system for card transaction
CN117454338A (en) Self-service identity registration and identity authentication method
CN111935716B (en) Authentication method, authentication system and computing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination