CN117786632A - Method and device for checking identity of target object by service system and computer equipment - Google Patents

Method and device for checking identity of target object by service system and computer equipment Download PDF

Info

Publication number
CN117786632A
CN117786632A CN202311718251.9A CN202311718251A CN117786632A CN 117786632 A CN117786632 A CN 117786632A CN 202311718251 A CN202311718251 A CN 202311718251A CN 117786632 A CN117786632 A CN 117786632A
Authority
CN
China
Prior art keywords
service
target object
identity
information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311718251.9A
Other languages
Chinese (zh)
Inventor
刘耀文
黄超
刘侃
梁栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202311718251.9A priority Critical patent/CN117786632A/en
Publication of CN117786632A publication Critical patent/CN117786632A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to the technical field of big data processing, and particularly discloses a method and a device for checking the identity of a target object by a service system and computer equipment, wherein the method comprises the following steps: receiving an application request of a target object for a target service, acquiring registration information of the target object according to the application request, and performing identity verification on the registration information according to a pre-established object information archive; under the condition that the identity verification is passed, acquiring service networking data of the target object in real time according to the registration information; judging whether the target object meets the admission rule of the target service or not according to the object information file corresponding to the registration information and the resource interaction information; and under the condition that the registration information meets the admission rule, carrying out admission processing on the application request. The method and the device can realize comprehensive judgment of local data and networking data, improve data comprehensiveness and improve the accuracy of target object identity verification.

Description

Method and device for checking identity of target object by service system and computer equipment
Technical Field
The disclosure relates to the technical field of big data processing, and in particular relates to a method, a device and computer equipment for checking the identity of a target object by a service system.
Background
With the high integration and intellectualization of the business system, the service objects of the business system are also diversified in areas. Therefore, the service system often needs to provide targeted and exclusive service for the target customer group, and before providing the exclusive service, the banking system needs to audit the identity of the target customer group, and the audit process often needs support of various data. For example, in the financial field, a specific service provided by a banking system is a specific service for farmers or merchants engaged in an extended second industry related to agriculture, and the banking system needs to perform admission verification on clients before performing trust.
In the related art, a banking system needs to perform identity verification of "related farmers" and "related merchants" on clients, so that data acquisition is complicated, and the comprehensive requirements of the data are difficult to meet.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, an apparatus, a computer device, a storage medium, and a computer program product for auditing an identity of a target object by a business system.
In a first aspect, the present disclosure provides a method for auditing an identity of a target object by a service system. The method comprises the following steps:
receiving an application request of a target object for a target service, acquiring registration information of the target object according to the application request, and performing identity verification on the registration information according to a pre-established object information archive;
acquiring service networking data of the target object in real time according to the registration information under the condition that the identity verification is passed, wherein the service networking data at least comprises resource interaction information associated with the registration information of the target object;
judging whether the target object meets the admission rule of the target service or not according to the object information file corresponding to the registration information and the resource interaction information; the admission rule includes: under the condition of calibrating a first service, if the target object is associated with any one of a second service and a third service, verifying according to an identity auditing rule corresponding to the second service and/or the third service to which the target object is associated, wherein the first service is a main service calibrated by the service system, the second service and the third service are services of different service types from the first service, and the identity auditing rule comprises a first identity rule and a second identity rule;
And under the condition that the registration information meets the admission rule, carrying out admission processing on the application request.
In one embodiment, the method further comprises:
and inputting target object information through an information filing page, establishing an object information file, and storing the object information file into an object information archive.
In one embodiment, the authenticating the registration information according to the pre-established object information archive includes:
verifying whether the registration information exists in the object information archive;
determining that the authentication passes if it is determined that the registration information exists in the object information archive;
and displaying an information profiling page under the condition that the registration information is determined not to exist in the object information archive.
In one embodiment, the determining whether the target object meets the admission rule of the target service according to the object information file corresponding to the registration information and the resource interaction information includes:
analyzing the resource distribution data and the resource type data of the target object according to the resource interaction information, and generating a first verification report and a second verification report;
Determining a region label and a target identity of the target object according to the object information file;
and verifying whether the admission rule is met or not based on the first verification report and the second verification report and the region tag and the target identity.
In one embodiment, the first identity rule is that the result of the first verification report is yes or the region tag belongs to a preset target region tag;
and the second identity rule is that the result of the second verification report is yes or the target identity is a second target identity.
In one embodiment, the admitting the application request includes:
and calculating service resource data which is allowed to be provided for the target object by the target service according to the object information file, the first verification report and the second verification report and returning.
In a second aspect, the present disclosure further provides an apparatus for verifying an identity of a target object by using a service system. The device comprises:
the primary verification module is used for receiving an application request of a target object for a target service, acquiring registration information of the target object according to the application request, and carrying out identity verification on the registration information according to a pre-established object information archive;
The networking module is used for acquiring service networking data of the target object in real time according to the registration information under the condition that the identity verification is passed, wherein the service networking data at least comprises resource interaction information associated with the registration information of the target object;
the rule verification module is used for judging whether the target object meets the admission rule of the target service according to the object information file corresponding to the registration information and the resource interaction information; the admission rule includes: under the condition of calibrating a first service, if the target object is associated with any one of a second service and a third service, verifying according to an identity auditing rule corresponding to the second service and/or the third service to which the target object is associated, wherein the first service is a main service calibrated by the service system, the second service and the third service are services of different service types from the first service, and the identity auditing rule comprises a first identity rule and a second identity rule;
and the admission module is used for admitting the application request under the condition that the registration information is determined to meet the admission rule.
In one embodiment, the apparatus further comprises:
and the filing module is used for inputting target object information through an information filing page, establishing an object information file and storing the object information file into the object information archive.
In one embodiment, the preliminary verification module includes:
the archive inquiry unit is used for verifying whether the registration information exists in the object information archive;
a verification passing unit configured to determine that the authentication passes in a case where it is determined that the registration information exists in the object information archive;
and the verification failure unit is used for displaying an information filing page under the condition that the registration information is determined not to exist in the object information archive.
In one embodiment, the rule verification module includes:
the report generation unit is used for analyzing the resource distribution data and the resource type data of the target object according to the resource interaction information and generating a first verification report and a second verification report;
the archive information extraction unit is used for determining the region label and the target identity of the target object according to the object information archive;
And the admission judgment unit is used for verifying whether the admission rule is met or not based on the first verification report, the second verification report, the region label and the target identity.
In one embodiment, the first identity rule is that the result of the first verification report is yes or the region tag belongs to a preset target region tag;
the second identity rule is that the result of the second verification report is yes or the target identity is yes.
In one embodiment, the admission module comprises:
and the resource calculation unit is used for calculating service resource data which is allowed to be provided for the target object by the target service according to the object information file, the first verification report and the second verification report and returning the service resource data.
In a third aspect, the present disclosure also provides a computer device. The computer equipment comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the identity auditing method of the business system to the target object when executing the computer program.
In a fourth aspect, the present disclosure also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the method for auditing the identity of a target object by a business system described above.
In a fifth aspect, the present disclosure also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of the method for auditing the identity of a target object by the business system.
The method, the device, the computer equipment, the storage medium and the computer program product for checking the identity of the target object by the service system at least comprise the following beneficial effects:
according to the method and the device, the application request of the target object can be rapidly subjected to identity verification according to the pre-established object information archive, the target object which obviously does not accord with the target business service rule is filtered, and the identity verification efficiency is improved; after the preliminary verification is passed, service networking data are obtained in real time according to registration information of the target object, resource interaction information of the target object is extracted, and an object information file is combined, so that local data of a server and the service networking data are comprehensively judged by utilizing an admission rule, and the admission of the target object is judged under the condition that the admission rule is met, so that the data on which the admission of the target object is judged is greatly expanded, the data comprehensiveness is improved, the data timeliness is improved, and the accuracy of identity verification of the target object is further improved; and the double identities of the target object can be verified according to the first identity rule and the second identity rule, so that the verification process is shortened, and the identity verification efficiency of the target object is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments or the conventional techniques of the present disclosure, the drawings required for the descriptions of the embodiments or the conventional techniques will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to the drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is a schematic diagram of an application environment of a method for auditing the identity of a target object by a business system in one embodiment;
FIG. 2 is a flow chart of a method for auditing the identity of a target object by a business system in one embodiment;
FIG. 3 is a flow chart of a method for auditing the identity of a target object by a business system in one embodiment;
FIG. 4 is a flow chart of a method for auditing the identity of a target object by a business system in one embodiment;
FIG. 5 is a block diagram schematically illustrating an apparatus for verifying the identity of a target object by a business system according to an embodiment;
FIG. 6 is a block diagram schematically illustrating the structure of a preliminary verification module in one embodiment;
FIG. 7 is a block diagram of the rules validation module in one embodiment;
FIG. 8 is a schematic block diagram of the internal architecture of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. The terminology used in the description of the disclosure herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure.
The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, it is not excluded that additional identical or equivalent elements may be present in a process, method, article, or apparatus that comprises a described element.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," and/or the like, specify the presence of stated features, integers, steps, operations, elements, components, or groups thereof, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or groups thereof. Also, in this specification, the term "and/or" includes any and all combinations of the associated listed items.
The method for checking the identity of the target object by the service system provided by the embodiment of the disclosure can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The server 104 is deployed with a service system, and the service system can receive an application request for a target service sent by the terminal 102, acquire registration information of a target object (which may be a user) according to the application request, perform identity verification according to the registration information of the target object, perform admission judgment according to a preset admission rule, provide a target service for the target object when the admission passes, and reject to provide the target service for the target object when the admission fails. For example, in a banking system, an existing first service (which may be a main service calibrated by the service system) is mainly oriented to a farmer engaged in a first industry, and there may be services of a different service type from the first service, for example, a second service and a third service are respectively oriented to a user of a second industry and a user of a third industry. Wherein the first industry is generally agriculture (including forestry, pasture, fishery, etc.), the second industry is generally industry (including mining, manufacturing, electricity, etc.) and construction, and the third industry is generally industry other than the first and second industries, including catering, tourism, etc. Users who engage in the second third industry, while not directly engaged in agriculture, are engaged in extending the second third industry in relation to agriculture. Therefore, the exclusive business (i.e. the target business) needs to be oriented to farmers or merchants engaged in the second and third industries related to agriculture, and the user needs to have double identities related to agriculture and merchants, but the existing identity verification method is difficult to acquire more comprehensive data, and the verification process is complex and complicated, so that the efficiency of user identity verification is greatly reduced as long as the manual verification is relied on.
The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In some embodiments of the present disclosure, as shown in fig. 2, a method for auditing an identity of a target object by a service system is provided, and the method is applied to a server in fig. 1 for illustration, and includes the following steps:
step 210, receiving an application request of a target object for a target service, acquiring registration information of the target object according to the application request, and performing identity verification on the registration information according to a pre-established object information archive.
For example, the server may receive an application request sent by the terminal, where the application request is used to apply for the service system to provide the target service, and the application request includes at least registration information of the target object. After the server analyzes the acquired registration information, the server can perform identity verification, which generally refers to verification based on an object information archive pre-established by the server, and can perform logic simpler verification, for example, whether the registration information of the target object is in the object information archive or not, or filter the registration information (such as address, age, etc.) by combining other information known by the object information archive, so as to filter out part of the target objects which do not meet the conditions.
Step 220, acquiring service networking data of the target object in real time according to the registration information under the condition that the identity verification is passed, wherein the service networking data at least comprises resource interaction information associated with the registration information of the target object.
The server, after authenticating the registration information of the target object, triggers the collection of service networking data in the case that the authentication is passed. The server may extract resource interaction information associated with the registration information of the target object on a published or authorized data source (not limited to website data, online databases, etc. data sources) based on the registration information. The resource interaction information may include data related to the asset movement of the target object, such as asset data under the target object name, bank pipeline information, and the like. When extracting the resource interaction information, the server can use the registration information of the target object as a keyword to extract the crawler.
Step 230, judging whether the target object meets the admission rule of the target service according to the object information file corresponding to the registration information and the resource interaction information; the admission rule includes: under the condition of calibrating a first service, if the target object is associated with any one of a second service and a third service, verifying according to an identity auditing rule corresponding to the second service and/or the third service associated with the target object, wherein the first service is a main service calibrated by the service system, the second service and the third service are services of different service types from the first service, and the identity auditing rule comprises a first identity rule and a second identity rule.
The server collects data by combining the object information files after obtaining the resource interaction information of the target object, and judges whether the target object meets the admission rule of the target service according to the collected data. Wherein, the admission rule includes: under the condition of calibrating the first service, if the target object is associated to any one of the second service and the third service, verifying according to the identity verification rule corresponding to the second service and/or the third service to which the target object is associated. I.e. the target object is a service object of a second service or a third service in the service system, i.e. a user engaged in a second industry and/or a third industry.
The server may verify, according to the admission rules, identity audit rules corresponding to the second business and/or the third business to which the target object engaged in the second industry and/or the third industry is associated. The first service may be a main service calibrated by the service system (for example, the first service may be a service calibrated by the service system and mainly oriented to a farmer engaged in the first industry), the second service and the third service are services of different service types from the first service, and the first service, the second service and the third service may be parallel services. The identity verification rule includes a first identity rule for verifying whether the target object engages in an extended service of the first service, and a second identity rule for verifying whether the target object engages in a preset service, which may be a service established according to a requirement of the target service, for example, the preset service may be a service providing a business service, that is, the target object engaged in the preset service is a user related to the business. And the server can judge the admission of the target object under the condition that the target object meets the first identity rule and meets the second identity rule.
And 240, performing admission processing on the application request under the condition that the registration information meets the admission rule.
For example, after verifying based on the admission rule, the server may perform admission processing on the application request if it is determined that the registration information of the target object satisfies the admission rule, that is, allow the target object with identity verification to enter the next procedure.
In the method for checking the identity of the target object by the service system, the application request of the target object can be rapidly authenticated according to the pre-established object information archive, and the target object which obviously does not accord with the service rule of the target service can be filtered, so that the authentication efficiency is improved; after the preliminary verification is passed, service networking data are obtained in real time according to registration information of the target object, resource interaction information of the target object is extracted, and an object information file is combined, so that local data of a server and the service networking data are comprehensively judged by utilizing an admission rule, and the admission of the target object is judged under the condition that the admission rule is met, so that the data on which the admission of the target object is judged is greatly expanded, the data comprehensiveness is improved, the data timeliness is improved, and the accuracy of identity verification of the target object is further improved; and the double identities of the target object can be verified according to the first identity rule and the second identity rule, so that the verification process is shortened, and the identity verification efficiency of the target object is greatly improved.
In some embodiments of the present disclosure, the method further comprises:
and inputting target object information through an information filing page, establishing an object information file, and storing the object information file into an object information archive.
For example, the server may pre-enter target object information, which may refer to a user engaged in the second industry and/or the third industry. Because the target object directly engaged in the second industry and/or the third industry is convenient to determine, the server may present an information profiling page to the target object engaged in the second industry and/or the third industry according to registration information of the target object, or the off-line staff may determine the target object and enter the target object information through the terminal. The server can establish a corresponding object information file according to the input target object information and store the object information file in an object information archive. The object information profile may include at least basic personal information and professional information of the target object. The server can also audit the target object information input by the target object before the object information file is established, and can combine the integrity and the authenticity of the online off-line audit information.
According to the method and the device, the object information archive is built in advance, information of the target object can be extracted and managed, the target object information can be conveniently and rapidly obtained in the approval process of the target service, and the identity verification efficiency of the target object is improved.
In some embodiments of the present disclosure, as shown in fig. 3, step 210 includes:
step 212 verifies whether the registration information is present in the object information archive.
For example, the server may search the object information archive for the existence of a corresponding object information archive based on the registration information. For example, the searching can be performed according to the name, the identification card number, the account number distributed by the service system and the like of the target object.
Step 214, in case it is determined that the registration information is present in the object information repository, determining that the authentication is passed.
The server may illustratively determine that the authentication passes upon determining that the registration information already has a corresponding object information profile in the object information repository.
Step 216, in case it is determined that the registration information is not present in the object information archive, displaying an information profiling page.
For example, the server may determine that the authentication is not passed when determining that the registration information does not have a corresponding object information profile in the object information repository, and may provide the information profiling page to the target object. The server can also prompt that the authentication fails through a popup window on the front-end page.
According to the embodiment, the object information archive corresponding to the registration information is searched in the pre-established object information archive, and the registration information exists in the object information archive as an identity verification rule, so that the identity verification efficiency is improved, the object information archive can be extracted in the query process, and the follow-up processing is facilitated.
In some embodiments of the present disclosure, as shown in fig. 4, step 230 includes:
and step 232, analyzing the resource distribution data and the resource type data of the target object according to the resource interaction information, and generating a first verification report and a second verification report.
Illustratively, the server analyzes the resource interaction information acquired by the internet to determine resource distribution data and resource type data of the target object, wherein the resource distribution data can include asset distribution information associated with the target object under the name of the target object, such as real estate information, flowing fund distribution information, bank flow information and the like. The resource type data may be an industry type identification (or label) that includes the target object acquisition asset or an industry type identification (or label) of the input resource. The server may generate a first verification report and a second verification report according to the resource interaction information, where the first verification report and the second verification report may include resource distribution data and resource type data obtained by parsing, and further include verification results, and the verification results of the first verification report and the second verification report may be yes or no.
In some embodiments, the verification results of the first verification report and the second verification report may be obtained by the server by parsing according to a preset resource rule based on the resource interaction information, for example, the resource rule may include that in a case that the first service is involved in the resource interaction information of the target object is determined, the result of generating the first verification report is yes; in the case that the industrial type identifier of the asset in the resource interaction information of the target object is determined to fall within a preset range (the preset range may be an identifier range specified by the foregoing preset service, for example, the preset range is related to a business identifier), the result of generating the second verification report is yes. In one embodiment, in an application scenario of a business system, the resource interaction information of a certain target object obtained by the server networking includes that the bank flow information relates to a first business (such as a large amount of agricultural products are purchased), the industry type of the obtained asset is a catering identifier (related to a business identifier), a result of generating the first verification report is yes, and a result of generating the second verification report is yes.
And step 234, determining the region label and the target identity of the target object according to the object information file.
Illustratively, the server may extract the zone tag and the target identity of the target object from the object information archive. The regional tag may be a regional management organization to which the target object belongs when registered in the service system, the service system may include a plurality of subsystems of different levels, the subsystems may provide services according to different regions, and the regional tag may be a regional tag specific to a county or a regional level. The target identity mark can mark the target identity mark as yes or no according to whether the target object is related to the preset service of the service system when the target object fills the object information file, and mark the target identity mark as no if the target object is not related to the preset service of the service system. That is, in the case where the target object is engaged in a business, the target identity is marked yes, and in the case where the target object is not engaged in a business, the target identity is marked no.
Step 236, verifying whether the admission rule is satisfied based on the first and second verification reports and the zone tag and the target identity.
The server may verify whether the admission rule is fulfilled, for example, after obtaining the first and second verification reports based on the networking data, and the zone tag and the target identity based on the object information profile. The server can judge whether the target object meets the first identity rule and the second identity rule or not according to the results of the first verification report and the second verification report and the obtained region label and the target identity mark, namely whether the target object has double identities of involved agriculture and involved commerce or not.
According to the method and the device, the regional tag and the target identity are extracted according to the object information file in the local data of the server, the first verification report and the second verification report of the target object are obtained through analysis or mining according to the service networking data, the farmer-involved identity and the business-involved identity of the target object can be verified in multiple dimensions, the accuracy of the identity verification of the target object is improved, and the combination of the local data and the networking data is realized.
In some embodiments of the present disclosure, the first identity rule is that a result of satisfying the first verification report is yes or the zone tag belongs to a preset target zone tag; the second identity rule is that the result of the second verification report is yes or the target identity is yes.
For example, the server may pre-configure the first identity rule and the second identity rule, where the first identity rule may be that the first identity verification passes when any of the following conditions is satisfied:
a1, the result of the first verification report is yes.
A2, the region labels belong to target region labels which are regularly arranged.
The service system can manage and maintain the target area organization list, namely, the object information file is registered with the area management organization to which the target object belongs when being registered in the service system, and when the area management organization belongs to the target area organization list, the area label can be judged to belong to the target area label set by the rule.
The second identity rule may be that the second identity verification passes when any of the following conditions is satisfied:
b1, the result of the second verification report is yes.
And B2, the target identity is yes.
In some embodiments, the server may pull the existing first identity admission rule and the second identity admission rule, that is, the first identity rule may further include the condition: a3, the existing first identity access rule is met, and when any of the conditions A1, A2 and A3 is met, the first identity verification is passed. The second identity rule may further include a condition: and B3, meeting the existing second identity admittance rule, and passing the second identity verification when any condition of the conditions B1, B2 and B3 is met. The existing first identity admission rule and second identity admission rule may be rules that are being applied in the service system to perform a first identity admission judgment and a second identity admission judgment.
In the embodiment, the or logic judgment is performed on the multiple judgment conditions in the first identity rule and the second identity rule, so that the judgment of the admission rule is conveniently performed from multiple dimensions and multiple data sources, and the accuracy and the efficiency of the identity verification of the target object are improved.
In some embodiments of the present disclosure, step 240 includes:
and calculating service resource data which is allowed to be provided for the target object by the target service according to the object information file, the first verification report and the second verification report and returning.
For example, the server may return, to the target object, service resource data that the target service may be allowed to provide for the target object, if it is determined that the registration information of the target object satisfies the admission rule. The service resource data can be calculated by a calculation formula or a calculation model preset by the server, and the basis of calculation can be extracted from the object information file, the first verification report and the second verification report.
In some embodiments, the service resource data may be calculated by a calculation model preset by the server, where the calculation model may be:
business resource data = { inflow data of resource interaction information + inflow data in business system + (inflow data in third party resource platform preset time-inflow data in third party resource platform preset time) + [ (inflow data in third party business system-inflow data in third party business system + supplementary inflow data)/business coefficient a ] } conversion coefficient b × resource characteristic coefficient c
The inflow data of the resource interaction information can be data of all inflow resources in the resource interaction information of the target object in the service networking data obtained in real time;
the inflow data in the service system can be the data of all resources inflow of the target object recorded in the database of the service system in the service system directly queried by the server;
entering data in the preset time of the third party resource platform can be the data of all resources in which the target object recorded in the object information file acquired by the server flows in the preset time (such as a plurality of latest months, weeks and days) of the third party resource platform (such as WeChat and payment treasures);
the data which are input in the preset time of the third party resource platform can be the data which are input in the object information file acquired by the server and are input by all resources of the third party resource platform (such as WeChat, payment treasures and the like) in the preset time (such as a plurality of latest months, weeks and days);
the input of the inflow data of the third-party service system can be that a server is connected with a database of the third-party service system, and the data of all resources inflow of a target object recorded in the database of the third-party service system in the third-party service system is searched;
The data which is recorded in the third-party service system and flows out of all resources in the third-party service system of the target object recorded in the database of the third-party service system can be searched for the database which is connected with the third-party service system by the server;
the supplementary inflow data can be data which relates to inflow of the target object resources in the service system or the obtained resource interaction information;
the business coefficient a, the calculation coefficient b and the resource characteristic coefficient c can be numerical values set by the server in advance according to the actual requirements of target business in the business system.
When the registration information of the target object meets the admission rule, the embodiment can shorten the handling flow, fully utilize the data acquired in the identity verification process to calculate the business resource data of the target object, improve the data utilization rate and improve the business handling efficiency.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the disclosure also provides a device for checking the identity of the target object by the service system for realizing the method for checking the identity of the target object by the service system. The implementation scheme of the solution provided by the device is similar to the implementation scheme recorded in the method, so the specific limitation of the embodiment of the device for verifying the identity of the target object by one or more service systems provided below can be referred to the limitation of the method for verifying the identity of the target object by the service system hereinabove, and the description is omitted here.
In some embodiments of the present disclosure, as shown in fig. 5, an apparatus for auditing an identity of a target object by a business system is provided. The apparatus 500 includes:
the primary verification module 510 is configured to receive an application request of a target object for a target service, obtain registration information of the target object according to the application request, and perform identity verification on the registration information according to a pre-established object information archive;
the networking module 520 is configured to obtain, in real time, service networking data of the target object according to the registration information if the authentication passes, where the service networking data includes at least resource interaction information associated with the registration information of the target object;
The rule verification module 530 is configured to determine whether the target object meets an admission rule of the target service according to an object information file corresponding to the registration information and resource interaction information; the admission rule includes: under the condition of calibrating a first service, if the target object is associated with any one of a second service and a third service, verifying according to an identity auditing rule corresponding to the second service and/or the third service to which the target object is associated, wherein the first service is a main service calibrated by the service system, the second service and the third service are services of different service types from the first service, and the identity auditing rule comprises a first identity rule and a second identity rule;
and the admission module 540 is configured to perform admission processing on the application request if it is determined that the registration information meets the admission rule.
In some embodiments of the present disclosure, the apparatus further comprises:
and the filing module is used for inputting target object information through an information filing page, establishing an object information file and storing the object information file into the object information archive.
In some embodiments of the present disclosure, as shown in fig. 6, the preliminary verification module 510 includes:
A archive query unit 512, configured to verify whether the registration information exists in the object information archive;
a verification passing unit 514, configured to determine that the authentication passes if it is determined that the registration information exists in the object information repository;
and a verification failure unit 516, configured to present an information profiling page if it is determined that the registration information does not exist in the object information archive.
In some embodiments of the present disclosure, as shown in fig. 7, the rule verification module 530 includes:
a report generating unit 532, configured to parse the resource distribution data and the resource type data of the target object according to the resource interaction information, and generate a first verification report and a second verification report;
a archive information extraction unit 534, configured to determine a region tag and a target identity of the target object according to the object information archive;
and an admission judgment unit 536, configured to verify whether the admission rule is satisfied based on the first verification report and the second verification report and the zone tag and the target identity.
In some embodiments of the present disclosure, the first identity rule is that the result of the first verification report is yes or the zone tag belongs to a preset target zone tag;
The second identity rule is that the result of the second verification report is yes or the target identity is yes.
In some embodiments of the present disclosure, the admission module comprises:
and the resource calculation unit is used for calculating service resource data which is allowed to be provided for the target object by the target service according to the object information file, the first verification report and the second verification report and returning the service resource data.
All or part of each module in the device for checking the identity of the target object by the service system can be realized by software, hardware and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules. It should be noted that, in the embodiment of the present disclosure, the division of the modules is merely a logic function division, and other division manners may be implemented in actual practice.
Based on the foregoing description of the embodiment of the method for auditing the identity of the target object by the service system, in another embodiment provided by the present disclosure, a computer device is provided, where the computer device may be a server, and an internal structure diagram of the computer device may be as shown in fig. 8. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a method for auditing the identity of a target object by a business system.
It will be appreciated by those skilled in the art that the structure shown in fig. 8 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
Based on the foregoing description of the embodiments of the method for auditing the identity of a target object by a business system, in another embodiment provided by the present disclosure, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor, implements the steps in the method embodiments described above.
Based on the foregoing description of embodiments of the business system identity auditing method for a target object, in another embodiment provided by the present disclosure, a computer program product is provided, including a computer program that, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use, and processing of the related data need to comply with the related laws and regulations.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
In the description of the present specification, reference to the terms "some embodiments," "other embodiments," "desired embodiments," and the like, means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, schematic descriptions of the above terms do not necessarily refer to the same embodiment or example.
It should be understood that, in the present specification, each embodiment of the method is described in a progressive manner, and the same/similar parts of each embodiment are referred to each other, where each embodiment focuses on a difference from other embodiments. For relevance, reference should be made to the description of other method embodiments.
The technical features of the above embodiments may be arbitrarily combined, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present disclosure, which are described in more detail and are not to be construed as limiting the scope of the claims. It should be noted that variations and modifications can be made by those skilled in the art without departing from the spirit of the disclosure, which are within the scope of the disclosure. Accordingly, the scope of protection of the present disclosure should be determined by the following claims.

Claims (10)

1. A method for auditing the identity of a target object by a business system, the method comprising:
receiving an application request of a target object for a target service, acquiring registration information of the target object according to the application request, and performing identity verification on the registration information according to a pre-established object information archive;
acquiring service networking data of the target object in real time according to the registration information under the condition that the identity verification is passed, wherein the service networking data at least comprises resource interaction information associated with the registration information of the target object;
judging whether the target object meets the admission rule of the target service or not according to the object information file corresponding to the registration information and the resource interaction information; the admission rule includes: under the condition of calibrating a first service, if the target object is associated with any one of a second service and a third service, verifying according to an identity auditing rule corresponding to the second service and/or the third service to which the target object is associated, wherein the first service is a main service calibrated by the service system, the second service and the third service are services of different service types from the first service, and the identity auditing rule comprises a first identity rule and a second identity rule;
And under the condition that the registration information meets the admission rule, carrying out admission processing on the application request.
2. The method according to claim 1, wherein the method further comprises:
and inputting target object information through an information filing page, establishing an object information file, and storing the object information file into an object information archive.
3. The method of claim 2, wherein said authenticating said registration information from a pre-established object information repository comprises:
verifying whether the registration information exists in the object information archive;
determining that the authentication passes if it is determined that the registration information exists in the object information archive;
and displaying an information profiling page under the condition that the registration information is determined not to exist in the object information archive.
4. The method of claim 1, wherein the determining whether the target object meets the admission rule of the target service according to the object information file corresponding to the registration information and the resource interaction information comprises:
analyzing the resource distribution data and the resource type data of the target object according to the resource interaction information, and generating a first verification report and a second verification report;
Determining a region label and a target identity of the target object according to the object information file;
and verifying whether the admission rule is met or not based on the first verification report and the second verification report and the region tag and the target identity.
5. The method of claim 4, wherein the first identity rule is that the result of the first verification report is yes or that the zone tag belongs to a preset target zone tag;
the second identity rule is that the result of the second verification report is yes or the target identity is yes.
6. The method of claim 1, wherein the admitting the application request comprises:
and calculating service resource data which is allowed to be provided for the target object by the target service according to the object information file, the first verification report and the second verification report and returning.
7. An apparatus for auditing the identity of a target object by a business system, said apparatus comprising:
the primary verification module is used for receiving an application request of a target object for a target service, acquiring registration information of the target object according to the application request, and carrying out identity verification on the registration information according to a pre-established object information archive;
The networking module is used for acquiring service networking data of the target object in real time according to the registration information under the condition that the identity verification is passed, wherein the service networking data at least comprises resource interaction information associated with the registration information of the target object;
the rule verification module is used for judging whether the target object meets the admission rule of the target service according to the object information file corresponding to the registration information and the resource interaction information; the admission rule includes: under the condition of calibrating a first service, if the target object is associated with any one of a second service and a third service, verifying according to an identity auditing rule corresponding to the second service and/or the third service to which the target object is associated, wherein the first service is a main service calibrated by the service system, the second service and the third service are services of different service types from the first service, and the identity auditing rule comprises a first identity rule and a second identity rule;
and the admission module is used for admitting the application request under the condition that the registration information is determined to meet the admission rule.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202311718251.9A 2023-12-14 2023-12-14 Method and device for checking identity of target object by service system and computer equipment Pending CN117786632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311718251.9A CN117786632A (en) 2023-12-14 2023-12-14 Method and device for checking identity of target object by service system and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311718251.9A CN117786632A (en) 2023-12-14 2023-12-14 Method and device for checking identity of target object by service system and computer equipment

Publications (1)

Publication Number Publication Date
CN117786632A true CN117786632A (en) 2024-03-29

Family

ID=90384652

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311718251.9A Pending CN117786632A (en) 2023-12-14 2023-12-14 Method and device for checking identity of target object by service system and computer equipment

Country Status (1)

Country Link
CN (1) CN117786632A (en)

Similar Documents

Publication Publication Date Title
CN110489520B (en) Knowledge graph-based event processing method, device, equipment and storage medium
US20210112101A1 (en) Data set and algorithm validation, bias characterization, and valuation
CN104765745B (en) Loading data in database are carried out with the method and system of logic checking
CN113837584B (en) Service processing system and abnormal data processing method based on service processing system
CN112990989B (en) Value prediction model input data generation method, device, equipment and medium
CN112069269B (en) Big data and multidimensional feature-based data tracing method and big data cloud server
CN112631889A (en) Portrayal method, device and equipment for application system and readable storage medium
CN116561607A (en) Method and device for detecting abnormality of resource interaction data and computer equipment
CN114495137B (en) Bill abnormity detection model generation method and bill abnormity detection method
US10594833B2 (en) System and method of reciprocal data sharing
US10509809B1 (en) Constructing ground truth when classifying data
CN117786632A (en) Method and device for checking identity of target object by service system and computer equipment
CN111723129B (en) Report generation method, report generation device and electronic equipment
CN114596147A (en) Data reconciliation method and device, computer equipment and storage medium
CN117043743A (en) Dynamic application builder for a multidimensional database environment
CN110457332B (en) Information processing method and related equipment
CN114372867A (en) User credit verification and evaluation method and device and computer equipment
CN113641725A (en) Information display method, device, equipment and storage medium
CN113807870B (en) Vehicle information authentication method, device, computer equipment and storage medium
CN113723522B (en) Abnormal user identification method and device, electronic equipment and storage medium
CN117391622A (en) Verification method and device for asset acquisition certificate application and computer equipment
CN117575773A (en) Method, device, computer equipment and storage medium for determining service data
CN116109417A (en) Product data processing method, device, computer equipment and storage medium
CN115393047A (en) Risk assessment method and device, computer equipment and storage medium
CN117522502A (en) Resource recommendation method, device, computer equipment and medium for meta space business hall

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination