WO2019000885A1 - 一种身份验证方法及装置,电子设备 - Google Patents

一种身份验证方法及装置,电子设备 Download PDF

Info

Publication number
WO2019000885A1
WO2019000885A1 PCT/CN2017/119772 CN2017119772W WO2019000885A1 WO 2019000885 A1 WO2019000885 A1 WO 2019000885A1 CN 2017119772 W CN2017119772 W CN 2017119772W WO 2019000885 A1 WO2019000885 A1 WO 2019000885A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity verification
client
authentication
calling
telephone number
Prior art date
Application number
PCT/CN2017/119772
Other languages
English (en)
French (fr)
Inventor
孙凤鸣
Original Assignee
北京三快在线科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京三快在线科技有限公司 filed Critical 北京三快在线科技有限公司
Priority to US16/618,339 priority Critical patent/US20210144247A1/en
Priority to JP2019566352A priority patent/JP2020523671A/ja
Priority to EP17915324.2A priority patent/EP3618379A4/en
Priority to KR1020197035663A priority patent/KR20200003162A/ko
Priority to CA3064797A priority patent/CA3064797A1/en
Publication of WO2019000885A1 publication Critical patent/WO2019000885A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/304Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/18Comparators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation

Definitions

  • the present disclosure relates to the field of identity verification.
  • Verification code verification has become an important means of authentication.
  • the verification code is usually sent by SMS, or the voice verification code is sent by VOIP (Voice over Internet Protocol), and then the user transcribes the received verification code and submits the verification to complete the verification process.
  • VOIP Voice over Internet Protocol
  • the logistics system will send a voice verification code to the mobile phone number input by the client, and the user will confirm the receipt after inputting the correct voice verification code on the client.
  • the embodiments of the present disclosure provide an identity verification method, which solves the problem that the process of the identity verification method in the prior art is complicated and error-prone.
  • an embodiment of the present disclosure provides an identity verification method, including:
  • the client sends an authentication request to the authentication server according to the user's authentication operation
  • the client initiates an incoming call interception
  • the client When the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, the client sends the intercepted calling telephone number as an authentication code to the authentication server. , used to authenticate the user.
  • an identity verification apparatus including:
  • An authentication request sending module configured to send an authentication request to the verification server according to the user's identity verification operation
  • An incoming interception module for initiating an incoming interception
  • An authentication module configured to: when the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, the calling telephone number intercepted by the incoming intercepting module is used as An authentication code is sent to the verification server for authenticating the user.
  • an embodiment of the present disclosure provides an identity verification method, including:
  • the server generates a calling phone number that meets a preset rule according to the received identity verification request from the client;
  • the server performs an incoming call operation on the phone number pre-registered by the current user of the client by using the calling phone number;
  • an identity verification code sent by the client where the identity verification code is a calling phone number used by the client for identity verification;
  • the server authenticates the current user of the client based on the received identity verification code and the generated calling phone number.
  • an identity verification apparatus including:
  • a calling telephone number generating module configured to generate a calling telephone number that meets a preset rule according to the received identity verification request from the client;
  • the verification call module is configured to perform an incoming call operation on the phone number pre-registered by the current user of the client by using the calling phone number generated by the calling phone number generation module;
  • An authentication code receiving module configured to receive an identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification;
  • the identity verification module is configured to perform identity verification on the current user of the client based on the identity verification code received by the identity verification code receiving module and the calling phone number generated by the calling number generation module.
  • an embodiment of the present disclosure provides an electronic device, including a storage medium, a processor, and the machine executable instructions executable by the processor, where the processor executes the machine
  • the identity verification method described in the embodiment of the present disclosure is implemented when the instruction is executed.
  • an embodiment of the present disclosure provides a machine readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the steps of the identity verification method according to the embodiment of the present disclosure.
  • the identity verification method disclosed in the embodiment of the present disclosure sends an identity verification request to the verification server according to the user operation, and initiates an incoming call interception operation on the preset calling telephone number; when the incoming call is intercepted to the calling telephone number
  • the intercepted call phone number is sent to the verification server as an authentication code for authenticating the current user, which solves the problem that the process of the identity verification method in the prior art is complicated and error-prone.
  • the user is not required to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the possibility of entering an incorrect verification code. Further, the efficiency of authentication is improved.
  • the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
  • FIG. 1 is a flowchart of an identity verification method according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of an identity verification method according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart of an identity verification method according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of an application scenario of an identity verification method according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present disclosure.
  • FIG. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
  • the present disclosure provides an authentication method that can be applied to devices where a client is located, such as a mobile phone, a smart phone, a PAD with a phone function, an electronic device with a phone function, and the like. As shown in FIG. 1, the method includes: Step 110 to Step 130.
  • Step 110 Send an identity verification request to the verification server according to the user's identity verification operation.
  • the business system For some application service products that need to judge the authenticity of the user, the business system requires the user to perform identity verification when the user registers or when the user performs a risky operation. For example, for an online shopping application, the business system must determine the authenticity of the user information in order to accept the user's order. Therefore, when the user performs a user registration operation on the client of the application, or when the user submits an order through the client of the application, Users need to be authenticated to ensure the authenticity of user information.
  • the client on the client side of the app, you can set up a button (softkey or hardkey) for authentication to initiate authentication. After the user presses the button for initiating authentication, the client will generate an authentication request and send the authentication request to the authentication server.
  • the client identifier may be carried in the identity verification request.
  • the identity verification request may carry identity information of a current user of the client, such as a username.
  • the application scenario for authentication is not limited to online shopping, but also has a wider range of applications, which are not enumerated here.
  • the operation of the user to initiate authentication is not limited to the user registration or submission of an order, and the present disclosure does not limit the operation of initiating the authentication.
  • step 120 the incoming call interception is initiated.
  • the device where the client is located can have the function of receiving incoming calls, such as a mobile phone, a smart phone, a PAD with a telephone function, a navigation device with a telephone function, and the like can receive incoming calls.
  • the identity verification method of the present disclosure is described by taking the device where the client is located as a smart phone as an example.
  • incoming call interception can be performed by calling a system interface (for example, an incoming call processing interface), or incoming call interception can be performed by a telephone blacklist function.
  • the system interface mentioned in this article may be an API interface provided by an operating system such as Android or iOS, and is not restrictive.
  • the phone blacklist can be set first on the device where the client is located.
  • the client automatically adds a set of preset calling phone numbers to the device's phone blacklist.
  • the preset calling telephone number may be an ordinary telephone number, or may be a telephone number that conforms to a preset rule, for example, a voice network telephone number that conforms to a preset rule.
  • the preset calling number may be intercepted and monitored by other methods, which is not limited in this disclosure.
  • Step 130 When the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, send the intercepted calling telephone number as an identity verification code to the verification server, Authenticating the user.
  • the system When an incoming call is performed on the device where the client is located by using the preset calling phone number, the system will actively intercept the incoming call initiated by the calling phone number, and the device where the client is located will not have an incoming call prompt or ringing, and there will be no Traffic charges are generated. Meanwhile, when intercepting the incoming call, the client may invoke the system interface to obtain the intercepted calling telephone number, and the intercepted calling telephone number and the calling telephone stored by the client for authentication. The number is matched. If the matching is successful, the calling phone number is sent to the verification server as an authentication code for identity verification.
  • the incoming call interception of the preset calling telephone number may be initiated, and then the authentication request may be sent to the authentication server; or the incoming interception of the preset calling telephone number may be initiated and the identity sent to the authentication server may be simultaneously performed.
  • the present disclosure does not limit the order of execution of the two steps.
  • the identity verification method disclosed in the embodiment of the present disclosure sends an identity verification request to the verification server according to the identity verification operation of the user, and initiates an incoming call interception to the preset calling phone number; when the preset calling phone is intercepted When the number is forwarded, the intercepted caller number is sent to the verification server as an authentication code for authenticating the current user, which solves the complicated process of the identity verification method in the prior art.
  • An error-prone problem By automatically intercepting the preset calling phone number and sending it to the server as an authentication code, the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the possibility of inputting a wrong verification code. Further, Improve the efficiency of authentication. Moreover, after the user initiates the identity verification process, the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
  • An identity verification method disclosed in another embodiment of the present disclosure includes: Step 210 to Step 270.
  • Step 210 Send an identity verification request to the verification server according to the identity verification operation of the user.
  • the authentication request sent by the client can include a client identification.
  • the verification server may determine an identity of the current user logged in to the client according to the client identifier, such as a username, and further determine a phone number pre-registered by the current user, such as 13612345678.
  • the verification server may automatically generate a numeric string of a preset length. For example, the verification server generates a 5-digit numeric string "00001". Then, the digital string can be combined with a preset prefix, such as 10123, into a calling telephone number according to a preset rule, such as 1012300001.
  • the verification server can invoke the voice network telephony service to call the telephone number, such as 1012300001, to perform an incoming call operation to the current user's telephone number, such as 13612345678.
  • the verification server can store the matching relationship between the client identifier and the generated calling telephone number, which is convenient for identity verification.
  • the client may prompt the user to input a phone number for authentication by using a pop-up edit box.
  • step 220 the incoming call interception is initiated.
  • initiating the incoming call interception may include: initiating a call blacklist-based incoming call interception operation, wherein the call blacklist is provided with a preset calling telephone number; and monitoring the calling telephone number intercepted by the incoming interception operation.
  • the preset calling telephone number can be first written into the telephone blacklist.
  • the client can automatically add the calling phone number used for authentication to the phone blacklist of the device.
  • the calling telephone number for authentication can be stored in the storage medium of the device on which the client is located.
  • the client reads the phone blacklist of the device (eg, mobile phone) and determines whether the calling phone number that the user authenticates is already stored in the phone. In the blacklist. If the latest calling phone number for authentication is not stored in the phone blacklist of the device where the client is located, the calling phone number for authentication performed by the client is added to the phone blacklist.
  • the client may first send a request to the authentication server to update the calling phone number for authentication, and update the calling phone number obtained from the server to the phone blacklist.
  • the calling telephone number used for authentication may be a normal telephone number or a telephone number that conforms to a preset rule, such as a group voice network telephone number from 1012300001 to 1012399999.
  • the preset rule may be a phone number length and/or a phone number prefix.
  • the calling telephone number includes: a voice network telephone number matching a preset rule.
  • the incoming call interception operation of the phone blacklist can be initiated.
  • the blacklist function can be initiated by calling the system interface. After the blacklist function is enabled, the system will filter the incoming calls of the calling number in the blacklist, generate an incoming interception event, and record the intercepted calling number.
  • the client can monitor the calling telephone number intercepted by the incoming interception operation in real time. For example, the client can implement the incoming call interception monitoring by monitoring the incoming call event of the system or setting a hook function in the incoming call processing process of the system, and obtaining the calling telephone number intercepted by the system.
  • step 230 the incoming interception timing is started.
  • the present disclosure may set the incoming call interception timing. For example, after initiating the interception interception monitoring of the calling telephone number, the incoming interception timing is started immediately, and the alternate authentication process is initiated after the incoming interception timing exceeds a preset threshold.
  • step 240 it is determined whether the incoming call of the calling telephone number is intercepted, and if yes, step 250 is performed; otherwise, step 260 is performed.
  • the period determines whether the incoming call to the calling telephone number is intercepted, and when the incoming call to the calling telephone number is intercepted, the calling telephone number to be intercepted is intercepted.
  • the authentication code is sent to the verification server for authenticating the current user. If the incoming call that does not monitor the calling telephone number is intercepted, it is determined whether the incoming interception timing exceeds a preset threshold.
  • the intercepted calling telephone number can be obtained by calling the interface provided by the system, and then the obtained intercepted calling telephone number is compared with the calling telephone number stored by the client for authentication, and determined. Whether the incoming call of the authenticated calling telephone number is blocked.
  • Step 250 Send the intercepted calling phone number as an authentication code to the verification server for authenticating the current user.
  • the client sends "1012300003" as an authentication code to the authentication server. For authentication by the authentication server.
  • the client sends the authentication code to the authentication server and can also send the client identifier.
  • an incoming call interception monitoring operation is completed. That is, one authentication ends.
  • Step 260 Determine whether the incoming interception timing exceeds a preset threshold. If yes, execute step 270; otherwise, go to step 240.
  • the client sends the intercepted calling telephone number as an authentication code to the verification server for identity verification
  • the incoming interception timing is started, and when the incoming interception timing exceeds a preset threshold Then initiate an alternate authentication process.
  • the timing threshold can be set to 60 seconds. If the incoming call for monitoring the calling telephone number for user authentication is not intercepted within 60 seconds, the incoming interception is considered to be unsuccessful, and the alternative authentication process is initiated.
  • step 270 an alternate authentication process is initiated.
  • the initiated alternative authentication process may send a verification code verification process for the short message. At this point, the authentication ends.
  • the server may search for the calling phone number corresponding to the client identifier of the current client from the matching relationship between the stored client identifier and the authentication code, and query the calling party. The phone number is compared with the authentication code, and if it matches, the identity verification of the current user of the client passes. After the authentication is passed, the authentication server notifies the client that the authentication is passed by sending a message or a preset instruction. If the client does not receive a client authentication pass notification sent by the authentication server before the timeout expires, the authentication is considered to have failed.
  • the identity verification method disclosed in the embodiment of the present disclosure by writing a set of preset calling phone numbers for identity verification into a phone blacklist; according to the user's identity verification operation, sending an identity verification request to the authentication server, and starting the opposite
  • the incoming call interception of the preset calling telephone number group when the incoming call of a calling telephone number in the calling telephone number group is intercepted, the calling telephone number of the intercepting belt is sent as an authentication code
  • the verification server is used for authenticating the current user, which solves the problem that the existing authentication method in the prior art is complicated and error-prone.
  • the user By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code, the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
  • the possibility of entering an error verification code further increases the efficiency of authentication.
  • the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
  • an alternative authentication process can be initiated immediately after the incoming interception fails, thereby improving the efficiency of authentication.
  • the voice network telephone number is randomly generated as the identity verification code, which can increase the difficulty of cracking the identity verification code and further improve the security of the identity verification system.
  • An identity verification method disclosed in another embodiment of the present disclosure includes: Step 300 to Step 330.
  • Step 300 Generate a calling phone number that meets a preset rule according to the received identity verification request from the client.
  • the business system For some application service products that need to judge the authenticity of the user, the business system requires the user to perform identity verification when the user registers or when the user performs a risky operation. For example, for an online shopping application, the business system must determine the authenticity of the user information in order to accept the user's order. Therefore, when the user performs a user registration operation on the client of the application, or when the user submits an order through the client of the application, Users need to be authenticated to ensure the authenticity of user information.
  • the client On the client side of the app, you can set up a button for authentication (soft or hard) to initiate authentication. After the user presses the button for initiating authentication, the client will generate an authentication request and send the authentication request to the authentication server.
  • the client identifier may be carried in the authentication request.
  • the identity verification request may carry identity information of a current user of the client, such as a username.
  • Generating a calling phone number that meets a preset rule according to the received identity verification request from the client including: randomly generating a first digit string of a preset length according to the received identity verification request from the client; The first digit string and the preset digit string are combined according to a preset rule to generate a calling telephone number.
  • the first digit string of a preset length may be automatically generated randomly.
  • the verification server may generate a 5-digit string "00001".
  • the first digit string can then be combined with a preset number string according to a preset rule.
  • the preset rule can be: phone number length and/or phone number prefix; phone number length and/or phone number suffix. Taking the telephone number length of the preset rule as 10 digits and the telephone number prefix as the digit string 10123 as an example, the first digit string "00001" generated by the verification server can be combined with the preset telephone number prefix as a calling party. Phone number, such as 1012300001.
  • the calling telephone number may include: a voice network telephone number matching a preset rule.
  • the telephone number may be 5 digits or 6 digits in length, and the sum of the length of the preset prefix or suffix and the length of the telephone number conforms to the requirements of the voice network telephone system.
  • the generated matching relationship between the calling telephone number and the client can be stored for authentication.
  • the verification server After the verification server generates the calling phone number that meets the preset rule according to the authentication request of the client, the generated matching relationship between the calling phone number and the client may be stored for identity verification.
  • Step 310 Perform an incoming operation on the phone number pre-registered by the current user of the client by using the calling phone number.
  • the verification server can invoke the voice network telephony service to perform an incoming call operation to the current user's telephone number (eg, 13612345678) with the generated calling telephone number (eg, 1012300001).
  • the verification server can store the matching relationship between the client identifier and the generated calling telephone number, which is convenient for identity verification. For example, when the user logs in to the client, the authentication server can further obtain the phone number bound by the current user at the time of registration through the user identifier.
  • the client may prompt the user to input a phone number for authentication by using a pop-up edit box.
  • Step 320 Receive an identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification.
  • the authentication server can start the operation of receiving the authentication code sent by the client.
  • the incoming interception monitoring can be started at the same time, so as to timely obtain the incoming interception event of the calling telephone number used for authentication in the blacklist of the telephone.
  • the calling phone number used for authentication in the phone blacklist includes the calling phone number generated by the authentication server.
  • the verification server When the verification server performs an incoming call to the device where the client is located by using the generated calling phone number, the system will actively intercept the incoming call initiated by the calling phone number, and the device where the client is located does not have an incoming call prompt or ringing, There will be traffic charges. Meanwhile, when intercepting the incoming call, the client may invoke the system interface to obtain the intercepted calling telephone number, and the intercepted calling telephone number and the calling telephone stored by the client for authentication. The number is matched. If the matching is successful, the calling phone number is sent to the verification server as an authentication code for identity verification.
  • Step 330 Perform identity verification on the current user of the client based on the received identity verification code and the generated calling phone number.
  • the verification server After the verification server receives the authentication code sent by the client, the authentication code is verified for consistency with the calling phone number previously generated for the client.
  • the authenticating the current user of the client based on the received identity verification code and the generated calling phone number comprises: comparing the identity verification code with the generated calling phone number If it matches, the authentication is passed.
  • the calling phone number matched by the client sending the identity verification code may be determined according to the matching relationship between the calling phone number and the client stored on the verification server according to the client identifier; and then the calling phone number is received and received The authentication code is compared. If it matches, the current user identity of the client sending the authentication code passes. Otherwise, the verification failed.
  • the identity verification method disclosed in the embodiment of the present disclosure generates a calling phone number that conforms to a preset rule according to the received identity verification request from the client, and pre-registers with the current user of the client by using the calling phone number.
  • the phone number performs an incoming call operation; then, based on the received identity verification code and the generated calling phone number, authenticating the current user of the client, where the identity verification code is used by the client to intercept
  • the authentication calling telephone number solves the problem that the existing authentication method in the prior art is complicated and error-prone.
  • By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
  • the possibility of entering an error verification code further increases the efficiency of authentication.
  • an identity verification method is further described below in combination with a specific application scenario.
  • the method is applied to a service product including a client and an authentication server, and the client and the verification server jointly perform an identity verification method to implement the pair.
  • the authentication of the current user of the client For example, as shown in FIG. 4, the specific process of identity verification includes: step 400 to step 470.
  • step 400 the client writes the calling phone number for authentication to the phone blacklist.
  • Step 410 The client sends an identity verification request to the verification server according to the user operation.
  • step 420 the client initiates an incoming interception of the calling telephone number.
  • Step 430 The verification server generates a calling telephone number that conforms to the preset rule according to the received identity verification request from the client.
  • Step 440 The verification server performs an incoming operation on the phone number pre-registered by the current user of the client by using the calling phone number.
  • Step 450 When the client intercepts the incoming call to the calling phone number, the intercepted calling phone number is sent to the verification server as an identity verification code for authenticating the current user.
  • the client monitors that the incoming call number of the calling telephone number is intercepted
  • the method for transmitting the intercepted calling telephone number as the identity verification code to the authentication server is described in the foregoing Embodiment 1 and Embodiment 2. The relevant steps are not described here.
  • Step 460 The verification server receives the identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification.
  • the verification server receives the authentication code sent by the client, and the identity verification code is a specific implementation manner of the calling phone number used for the authentication of the client, and the related steps in the foregoing Embodiment 3 are not described herein. .
  • Step 470 The verification server performs identity verification on the current user of the client based on the received identity verification code and the generated calling phone number.
  • the identity verification method disclosed in the embodiment of the present disclosure by writing a calling phone number for identity verification into a phone blacklist; sending an identity verification request to the authentication server according to a user operation, and starting a call to the calling phone number
  • the intercepted calling telephone number is sent to the verification server as an authentication code for authenticating the current user, and the existing
  • the authentication method in the technology has a complicated process and is prone to error.
  • the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
  • the possibility of entering an error verification code further increases the efficiency of authentication.
  • the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
  • an alternative authentication process can be initiated immediately after the incoming interception fails, thereby improving the efficiency of authentication.
  • the voice network telephone number is randomly generated as the identity verification code, which can increase the difficulty of cracking the identity verification code and further improve the security of the identity verification system.
  • an identity verification apparatus disclosed in the embodiment of the present disclosure includes:
  • the authentication request sending module 510 is configured to send an identity verification request to the verification server according to the identity verification operation of the user;
  • the incoming interception module 520 is configured to initiate an incoming call interception
  • the authentication module 530 is configured to: when the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, use the calling telephone number intercepted by the incoming intercepting module 520 as An authentication code is sent to the verification server for authenticating the current user.
  • the apparatus further includes:
  • the phone blacklist update module 500 is configured to write the calling phone number used for identity verification into the phone blacklist
  • the incoming interception module 520 is further configured to:
  • the apparatus further includes:
  • the alternate authentication initiation module 540 is configured to initiate an incoming interception timing and initiate an alternate authentication process after the incoming interception timing exceeds a preset threshold.
  • the calling phone number includes: a voice network phone number that matches a preset rule.
  • the identity verification apparatus disclosed in the embodiment of the present disclosure sends an identity verification request to the verification server according to the identity verification operation of the user, and initiates an incoming call interception to the preset calling telephone number; when the calling telephone number is intercepted
  • the intercepted call phone number is sent to the verification server as an authentication code for authenticating the current user, which solves the complicated process of the prior art identity verification method and is prone to error.
  • the problem By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code, the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
  • the possibility of entering an error verification code further increases the efficiency of authentication.
  • the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
  • an alternative authentication process can be initiated immediately after the incoming interception fails, thereby improving the efficiency of authentication.
  • the voice network telephone number is randomly generated as the identity verification code, which can increase the difficulty of cracking the identity verification code and further improve the security of the identity verification system.
  • an identity verification apparatus disclosed in the embodiment of the present disclosure includes:
  • the calling phone number generating module 700 is configured to generate a calling phone number that meets a preset rule according to the received identity verification request from the client;
  • the verification incoming call module 710 is configured to perform an incoming call operation on the telephone number pre-registered by the current user of the client by using the calling telephone number generated by the calling telephone number generating module 700;
  • the authentication code receiving module 720 is configured to receive an identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification.
  • the identity verification module 730 is configured to perform identity on the current user of the client based on the identity verification code received by the identity verification code receiving module 720 and the calling phone number generated by the calling phone number generation module 700. verification.
  • the calling phone number generation module 700 is further configured to:
  • the first digit string and the preset digit string are combined according to a preset rule to generate a calling telephone number.
  • the calling phone number includes: a voice network phone number that matches a preset rule.
  • the identity verification module 730 is further configured to:
  • the authentication code is compared with the generated calling phone number, and if it matches, the identity verification is passed.
  • the identity verification apparatus disclosed in the embodiment of the present disclosure generates a calling telephone number that conforms to a preset rule according to the received identity verification request from the client, and pre-registers with the current user of the client by using the calling telephone number.
  • the phone number performs an incoming call operation; then, based on the received identity verification code and the generated calling phone number, authenticating the current user of the client, where the identity verification code is used by the client to intercept
  • the authentication calling telephone number solves the problem that the existing authentication method in the prior art is complicated and error-prone.
  • By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
  • the possibility of entering an error verification code further increases the efficiency of authentication.
  • the present disclosure also discloses an electronic device, as shown in FIG. 8, the electronic device includes a storage medium 801, and a processor 802, which stores machine executable instructions executable by the processor 802,
  • the processor 802 implements the identity verification method according to the first embodiment to the third embodiment of the present disclosure when the machine executable instructions are executed.
  • the electronic device may be a mobile terminal, a smart phone with a phone call function, a navigator, a personal digital assistant, a tablet computer, or the like.
  • the present disclosure also discloses a machine readable storage medium having stored thereon machine executable instructions that, when executed by a processor, implement steps of an identity verification method as described in Embodiments 1 through 3 of the present disclosure .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开提供了一种身份验证方法,所述方法包括:根据用户的身份验证操作,向验证服务器发送身份验证请求,并启动呼入拦截;当拦截到所述验证服务器响应于该身份验证请求而发送的主叫电话号码的呼入时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证。

Description

一种身份验证方法及装置,电子设备
相关申请的交叉引用
本专利申请要求于2017年6月28日提交的、申请号为201710508830.9、发明名称为“一种静默验证方法及装置,电子设备”的中国专利申请的优先权,该申请的全文以引用的方式并入本文中。
技术领域
本公开涉及身份验证领域。
背景技术
随着现有互联网业务的不断发展,大部分业务产品需要判断用户的真实性,因此在用户注册时或者当用户执行风险性较高的操作时,业务系统会要求用户进行身份验证。
验证码验证已经成为身份验证的重要手段。通过验证码进行身份验证时,通常是通过短信下发验证码,或者是通过VOIP(Voice over Internet Protocol)电话下发语音验证码,然后用户转录输入接收的验证码,并提交验证以完成验证流程。例如,闪送签收时,物流系统会向客户端输入的手机号码发送语音验证码,用户在客户端输入正确的语音验证码后,才确认本人签收。
发明内容
本公开实施例提供一种身份验证方法,解决现有技术中的身份验证方法存在的过程复杂,容易出错的问题。
为了解决上述问题,第一方面,本公开实施例提供了一种身份验证方法,包括:
客户端根据用户的身份验证操作,向验证服务器发送身份验证请求;
所述客户端启动呼入拦截;
当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,所述客户端将拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器, 用于对所述用户进行身份验证。
第二方面,本公开实施例提供了一种身份验证装置,包括:
身份验证请求发送模块,用于根据用户的身份验证操作,向验证服务器发送身份验证请求;
呼入拦截模块,用于启动呼入拦截;
身份验证模块,用于当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截到时,将所述呼入拦截模块拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对所述用户进行身份验证。
第三方面,本公开实施例提供了一种身份验证方法,包括:
服务器根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;
所述服务器以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;
所述服务器接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码;
所述服务器基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证。
第四方面,本公开实施例提供了一种身份验证装置,包括:
主叫电话号码生成模块,用于根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;
验证呼入模块,用于以所述主叫电话号码生成模块生成的主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;
身份验证码接收模块,用于接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码;
身份验证模块,用于基于所述身份验证码接收模块接收到的所述身份验证码和所述主叫电话号码生成模块生成的主叫电话号码,对所述客户端的当前用户进行身份验证。
第五方面,本公开实施例提供了一种电子设备,包括存储介质、处理器,所述存储 介质上存储有所述处理器可运行的机器可执行指令,所述处理器执行所述机器可执行指令时实现本公开实施例所述的身份验证方法。
第六方面,本公开实施例提供了一种机器可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现本公开实施例所述的身份验证方法的步骤。
本公开实施例公开的身份验证方法,通过根据用户操作,向验证服务器发送身份验证请求,并启动对预设主叫电话号码的呼入拦截操作;当拦截到所述主叫电话号码的呼入时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证,解决了现有技术中的身份验证方法存在的过程复杂,容易出错的问题。通过对用于身份验证的主叫电话号码进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。并且,身份验证的过程在用户启动身份验证之后,后续验证过程静默执行,不打断用户正常执行的操作流程,进一步提升了用户体验。
附图说明
为了更清楚地说明本公开实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1是本公开实施例的身份验证方法的流程图;
图2是本公开实施例的身份验证方法的流程图;
图3是本公开实施例的身份验证方法的流程图;
图4是本公开实施例的身份验证方法的应用场景示意图;
图5是本公开实施例的身份验证装置结构示意图;
图6是本公开实施例的身份验证装置结构示意图;
图7是本公开实施例的身份验证装置结构示意图;
图8是本公开实施例的电子设备结构示意图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
实施例一
本公开提供了一种身份验证方法,该方法可以应用于客户端所在的设备,诸如手机、智能电话、具有电话功能的PAD、具有电话功能的导航仪等电子设备等。如图1所示,该方法包括:步骤110至步骤130。
步骤110,根据用户的身份验证操作,向验证服务器发送身份验证请求。
对于一些要判断用户的真实性的应用业务产品,在用户进行注册或者当用户执行风险性较高的操作时,业务系统会要求用户进行身份验证。例如,对于网购应用,业务系统要确定用户信息的真实性,才能接受用户的订单,因此,当用户在应用的客户端执行用户注册操作时,或者当用户通过应用的客户端提交订单时,往往需要对用户进行身份验证,以确保用户信息的真实性。
例如,在应用的客户端,可以设置进行身份验证的按钮(软键或硬键),用于启动身份验证。当用户按下用于启动身份验证的按钮之后,客户端将生成身份验证请求,并将所述身份验证请求发送至验证服务器。所述身份验证请求中可携带客户端标识。可选的,所述身份验证请求中可携带客户端的当前用户的身份信息,如用户名。
进行身份验证的应用场景不限于网购,还可以有更广泛的应用,此处不再一一列举。用户启动身份验证的操作也不限于用户注册或提交订单,本公开对启动身份验证的操作不做限定。
步骤120,启动呼入拦截。
客户端所在设备可具备能够接收电话呼入的功能,如:手机、智能电话、具有电话功能的PAD、具有电话功能的导航仪等电子设备都可接收电话呼入。本公开中,以客户端所在设备为智能手机为例,说明本公开的身份验证方法。例如,可以通过调用系统接口(例如,来电处理接口)进行呼入拦截,也可以通过电话黑名单功能进行呼入拦截。本文中提到的系统接口可以是由Android、iOS等操作系统提供的API接口,并不具有 限制性。当通过电话黑名单功能进行呼入拦截时,可首先在客户端所在设备设置电话黑名单。通常,在设备首次安装应用客户端时,由客户端自动将一组预设主叫电话号码加入到设备的电话黑名单中。所述预设主叫电话号码可以为普通电话号码,也可以为符合预设规则的电话号码,例如,符合预设规则的语音网络电话号码。
以上仅为举例,还可以采用其它方法对预设主叫号码进行拦截监控,本公开对此不做限定。
步骤130,当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对所述用户进行身份验证。
当以预设主叫电话号码对所述客户端所在设备执行呼入时,系统会主动拦截该主叫电话号码发起的呼入,客户端所在设备不会出现来电提示或者振铃,不会有流量费用产生。同时,当拦截到呼入电话时,客户端可调用系统接口获取拦截到的主叫电话号码,并将所述拦截到的主叫电话号码与客户端存储的用于进行身份验证的主叫电话号码进行匹配,若匹配成功,则将该主叫电话号码作为身份验证码发送至所述验证服务器,以用于进行身份验证。
在一个示例中,可以先启动对预设主叫电话号码的呼入拦截,再向验证服务器发送身份验证请求;或者同时执行启动对预设主叫电话号码的呼入拦截和向验证服务器发送身份验证请求的操作,本公开对这两个步骤的执行顺序不做限定。
本公开实施例公开的身份验证方法,通过根据用户的身份验证操作,向验证服务器发送身份验证请求,并启动对预设主叫电话号码的呼入拦截;当拦截到所述预设主叫电话号码的呼入时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证,解决了现有技术中的身份验证方法存在的过程复杂,容易出错的问题。通过对预设主叫电话号码进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。并且,身份验证的过程在用户启动身份验证之后,后续验证过程静默执行,不打断用户正常执行的操作流程,进一步提升了用户体验。
实施例二
本公开另一实施例公开的一种身份验证方法,如图2所示,该方法包括:步骤210 至步骤270。
步骤210,根据用户的身份验证操作,向验证服务器发送身份验证请求。
根据用户操作,向验证服务器发送身份验证请求的具体实施方式参见实施例一中的相关步骤,本实施例不再赘述。
在一个示例中,客户端发送的身份验证请求可包括客户端标识。验证服务器可根据所述客户端标识确定登陆所述客户端的当前用户的身份标识,如用户名,并进一步确定当前用户预先注册的电话号码,如13612345678。所述验证服务器接收到客户端发送的身份验证请求之后,可自动生成一个预设长度的数字串,例如,验证服务器生成一个5位的数字串“00001”。然后,可按照预设规则将该数字串与预设的前缀,如10123,组合为一个主叫电话号码,如1012300001。之后,验证服务器可调用语音网络电话服务以主叫电话号码,如1012300001,向所述当前用户的电话号码,如13612345678,执行呼入操作。同时,验证服务器可存储客户端标识和生成的主叫电话号码的匹配关系,便于进行身份验证。
可选的,如果当前用户没有预先注册用于身份验证的电话号码,客户端可以通过弹出编辑框提示用户输入用于身份验证的电话号码。
步骤220,启动呼入拦截。
例如,启动呼入拦截可包括:启动基于电话黑名单的呼入拦截操作,所述电话黑名单中设置有预设主叫电话号码;监控所述呼入拦截操作拦截的主叫电话号码。
当通过电话黑名单功能实现呼入拦截时,可首先将预设主叫电话号码写入电话黑名单。
例如,客户端可自动将用于身份验证的主叫电话号码加入所在设备的电话黑名单。用于身份验证的主叫电话号码可存储在所述客户端所在设备的存储介质中。例如,当客户端被首次安装或者客户端更新后首次启动时,客户端会读取所在设备(如,手机)的电话黑名单,并判断用户进行身份验证的主叫电话号码是否已经存储在电话黑名单中。若客户端所在设备的电话黑名单中没有存储最新的用于身份验证的主叫电话号码,则将所述客户端携带的用于身份验证的主叫电话号码加入所述电话黑名单。或者,当客户端启动时,客户端可首先向验证服务器发送更新用于身份验证的主叫电话号码的请求,并将从服务器获取的主叫电话号码更新至所述电话黑名单。
例如,用于身份验证的主叫电话号码可以为普通电话号码,也可以为符合预设规则 的电话号码,如从1012300001到1012399999的组语音网络电话号码。所述预设规则可以为电话号码长度和/或电话号码前缀。所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
然后,可启动电话黑名单的呼入拦截操作。例如,可以通过调用系统接口,启动黑名单功能。当黑名单功能启动后,系统将会对黑名单中的主叫号码发生的呼入进行过滤,并产生呼入拦截事件,同时记录拦截的主叫号码。
启动电话黑名单呼入拦截操作之后,客户端可实时监控所述呼入拦截操作拦截的主叫电话号码。例如,客户端可通过监控系统的来电事件或者在系统的来电处理流程中设置钩子函数,实现呼入拦截监控,并获取系统拦截的主叫电话号码。
步骤230,启动呼入拦截计时。
为了避免用户未开启电话黑名单拦截功能,或者呼入拦截失败,本公开可设置呼入拦截计时。例如,在启动对所述主叫电话号码的呼入拦截监控之后,立刻启动呼入拦截计时,并在呼入拦截计时超出预设阈值后启动备选身份验证流程。
步骤240,判断是否监控到所述主叫电话号码的呼入被拦截,若是,则执行步骤250,否则,执行步骤260。
在启动呼入拦截监控之后,周期判断是否监控到所述主叫电话号码的呼入被拦截,当监控到所述主叫电话号码的呼入被拦截时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证。若没有监控到所述主叫电话号码的呼入被拦截,则判断呼入拦截计时是否超出预设阈值。
例如,可通过调用系统提供的接口获取拦截到的主叫电话号码,然后再将获取到的被拦截的主叫电话号码和客户端存储的用于身份验证的主叫电话号码进行比较,确定用于身份验证的主叫电话号码的呼入是否被拦截。
步骤250,将拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证。
以客户端存储的用于身份验证的主叫电话号码为1012300001到1012399999为例,若拦截到的主叫电话号码为“1012300003”,则客户端将“1012300003”作为身份验证码发送至验证服务器,以供所述验证服务器进行身份验证。
客户端将身份验证码发送至所述验证服务器同时,还可发送客户端标识。
当客户端将拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器之后,一次呼入拦截监控操作执行完毕。即,一次身份验证结束。
步骤260,判断呼入拦截计时是否超出预设阈值,若是,则执行步骤270;否则,跳转至步骤240。
例如,当客户端将拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,以进行身份验证之时,启动呼入拦截计时,并在呼入拦截计时超出预设阈值时后启动备选身份验证流程。
例如,可以将计时阈值设置为60秒,若60秒之内没有监控到用于用户身份验证的主叫电话号码的呼入被拦截,则认为呼入拦截失败,启动备选身份验证流程。
步骤270,启动备选身份验证流程。
例如,呼入拦截计时超出预设阈值后,启动的备选身份验证流程可以为短信发送验证码的验证流程等。至此一次身份验证结束。
当验证服务器收到客户端发送的身份验证码后,可从存储的客户端标识和身份验证码的匹配关系中搜索出当前客户端的客户端标识对应的主叫电话号码,并将所述主叫电话号码和所述身份验证码进行比较,若匹配,则所述客户端的当前用户的身份验证通过。身份验证通过之后,验证服务器会通过发送消息或预设指令的方式通知客户端身份验证通过。如果客户端在超时计时结束前没有收到验证服务器会发送的客户端验证通过通知,则认为验证失败。
本公开实施例公开的身份验证方法,通过将用于身份验证的一组预设主叫电话号码写入电话黑名单;根据用户的身份验证操作,向验证服务器发送身份验证请求,并启动对所述预设主叫电话号码组的呼入拦截;当拦截到所述主叫电话号码组中的一个主叫电话号码的呼入时,将拦截带的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证,解决了现有技术中的身份验证方法存在的过程复杂,容易出错的问题。通过将用于身份验证的主叫电话号码写入电话黑名单,进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。并且,身份验证的过程在用户启动身份验证之后,后续验证过程静默执行,不打断用户正常执行的操作流程,进一步提升了用户体验。
通过对呼入拦截进行超时监控,能够在呼入拦截失败后立刻启动备选身份验证流程, 提高身份验证效率。通过与语音网络电话系统相结合,随机生成语音网络电话号码作为身份验证码,可以增加身份验证码的破解难度,进一步提高身份验证系统的安全性。
实施例三
本公开另一实施例公开的一种身份验证方法,如图3所示,该方法包括:步骤300至步骤330。
步骤300,根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码。
对于一些要判断用户的真实性的应用业务产品,在用户进行注册或者当用户执行风险性较高的操作时,业务系统会要求用户进行身份验证。例如,对于网购应用,业务系统要确定用户信息的真实性,才能接受用户的订单,因此,当用户在应用的客户端执行用户注册操作时,或者当用户通过应用的客户端提交订单时,往往需要对用户进行身份验证,以确保用户信息的真实性。
在应用的客户端,可以设置进行身份验证的按钮(软键或硬键),用于启动身份验证。当用户按下用于启动身份验证的按钮之后,客户端将生成身份验证请求,并将所述身份验证请求发送至验证服务器。例如,所述身份验证请求中可携带客户端标识。可选的,所述身份验证请求中可携带客户端的当前用户的身份信息,如用户名。
根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码,包括:根据接收到的来自客户端的身份验证请求,可随机生成一预设长度的第一数字串;将所述第一数字串和预设数字串按照预设规则进行组合,生成一主叫电话号码。
例如,当验证服务器接收到客户端发送的身份验证请求之后,可自动随机生成一个预设长度的第一数字串,例如,验证服务器可生成一个5位数字串“00001”。然后,可按照预设规则将该第一数字串与预设数字串组合。例如,预设规则可以为:电话号码长度和/或电话号码前缀;电话号码长度和/或电话号码后缀。以所述预设规则中电话号码长度为10位、电话号码前缀为数字串10123为例,验证服务器生成的5位的第一数字串“00001”可与预设电话号码前缀组合为一个主叫电话号码,如1012300001。所述主叫电话号码可包括:匹配预设规则的语音网络电话号码。所述电话号码长度可以为5位数字或6位数字,所述预设前缀或后缀的长度和所述电话号码长度之和符合语音网络电话系统的要求。
在一个示例中,可存储生成的所述主叫电话号码和所述客户端的匹配关系,用于进 行身份验证。
验证服务器在根据客户端的身份验证请求生成符合预设规则的主叫电话号码之后,可存储生成的所述主叫电话号码和所述客户端的匹配关系,用于进行身份验证。
步骤310,以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作。
之后,验证服务器可调用语音网络电话服务以生成的主叫电话号码(如1012300001)向当前用户的电话号码(如13612345678)执行呼入操作。同时,验证服务器可存储客户端标识和生成的主叫电话号码的匹配关系,便于进行身份验证。例如,用户登录所述客户端时,验证服务器通过用户标识可以进一步获取当前用户在注册时绑定的电话号码。
可选的,如果当前用户没有预先注册用于身份验证的电话号码,客户端可以通过弹出编辑框提示用户输入用于身份验证的电话号码。
步骤320,可接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码。
验证服务器可调用语音网络电话服务以生成的主叫电话号码对当前用户的电话号码执行呼入操作之后,同时可启动接收客户端发送的身份验证码的操作。
客户端在发出身份验证请求之后,可同时启动呼入拦截监控,以便及时获取电话黑名单中用于进行身份验证的主叫电话号码的呼入拦截事件。电话黑名单中用于进行身份验证的主叫电话号码包括验证服务器生成的主叫电话号码。
当验证服务器以生成的主叫电话号码对所述客户端所在设备执行呼入时,系统会主动拦截该主叫电话号码发起的呼入,客户端所在设备不会出现来电提示或者振铃,不会有流量费用产生。同时,当拦截到呼入电话时,客户端可调用系统接口获取拦截到的主叫电话号码,并将所述拦截到的主叫电话号码与客户端存储的用于进行身份验证的主叫电话号码进行匹配,若匹配成功,则将该主叫电话号码作为身份验证码发送至所述验证服务器,以用于进行身份验证。
步骤330,可基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证。
当验证服务器接收到所述客户端发送的身份验证码之后,将该身份验证码与之前为 该客户端生成的主叫电话号码进行一致性验证。所述基于接收到的所述身份验证码和所述生成的主叫电话号码,对所述客户端的当前用户进行身份验证包括:将所述身份验证码和生成的所述主叫电话号码进行比较,若匹配,则身份验证通过。
在一个示例中,在存储的所述主叫电话号码和所述客户端的匹配关系中,确定所述客户端匹配的主叫电话号码;将所述身份验证码和确定的所述客户端匹配的主叫电话号码进行比较,若匹配,则身份验证通过。首先,可根据客户端标识在验证服务器上存储的主叫电话号码和客户端的匹配关系中确定发送身份验证码的客户端匹配的主叫电话号码;然后,将该主叫电话号码与接收到的身份验证码进行比较,若匹配,则发送身份验证码的客户端的当前用户身份验证通过。否者,验证失败。
本公开实施例公开的身份验证方法,通过根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;然后,基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码,解决了现有技术中的身份验证方法存在的过程复杂,容易出错的问题。通过将用于身份验证的主叫电话号码写入电话黑名单,进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。
下面结合具体应用场景进一步说明一种身份验证方法的技术方案,如图4所示,该方法应用于包括客户端和验证服务器的业务产品,客户端和验证服务器共同执行身份验证方法,以实现对客户端的当前用户的身份验证。例如,如图4所示,身份验证的具体过程包括:步骤400至步骤470。
步骤400,客户端将用于身份验证的主叫电话号码写入电话黑名单。
客户端将用于身份验证的主叫电话号码写入电话黑名单的具体实施方式参见前述实施例一和实施例二的相关步骤,此处不再赘述。
步骤410,客户端根据用户操作,向验证服务器发送身份验证请求。
客户端根据用户操作,向验证服务器发送身份验证请求的具体实施方式参见前述实施例一和实施例二的相关步骤,此处不再赘述。
步骤420,客户端启动对所述主叫电话号码的呼入拦截。
客户端启动对所述主叫电话号码的呼入拦截的具体实施方式参见前述实施例一 和实施例二的相关步骤,此处不再赘述。
步骤430,验证服务器根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码。
验证服务器根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码的具体实施方式参见前述实施例三的相关步骤,此处不再赘述。
步骤440,验证服务器以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作。
验证服务器以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作的具体实施方式参见前述实施例三的相关步骤,此处不再赘述。
步骤450,当客户端拦截到所述主叫电话号码的呼入时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证。
当客户端监控到所述主叫电话号码的呼入被拦截时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器的具体实施方式参见前述实施例一和实施例二的相关步骤,此处不再赘述。
步骤460,验证服务器接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码。
验证服务器接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码的具体实施方式参见前述实施例三的相关步骤,此处不再赘述。
步骤470,验证服务器基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证。
验证服务器基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证的具体实施方式参见前述实施例三的相关步骤,此处不再赘述。
本公开实施例公开的身份验证方法,通过将用于身份验证的主叫电话号码写入电话黑名单;根据用户操作,向验证服务器发送身份验证请求,并启动对所述主叫电话号码的呼入拦截;当拦截到所述主叫电话号码的呼入时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证,解决了现有技术 中的身份验证方法存在的过程复杂,容易出错的问题。通过将用于身份验证的主叫电话号码写入电话黑名单,进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。并且,身份验证的过程在用户启动身份验证之后,后续验证过程静默执行,不打断用户正常执行的操作流程,进一步提升了用户体验。
通过对呼入拦截进行超时监控,能够在呼入拦截失败后立刻启动备选身份验证流程,提高身份验证效率。通过与语音网络电话系统相结合,随机生成语音网络电话号码作为身份验证码,可以增加身份验证码的破解难度,进一步提高身份验证系统的安全性。
实施例四
相应的,本公开实施例公开的一种身份验证装置,如图5所示,所述装置包括:
身份验证请求发送模块510,用于根据用户的身份验证操作,向验证服务器发送身份验证请求;
呼入拦截模块520,用于启动呼入拦截;
身份验证模块530,用于当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,将所述呼入拦截模块520拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证。
可选的,如图6所示,所述装置还包括:
电话黑名单更新模块500,用于将用于身份验证的主叫电话号码写入电话黑名单;
可选的,所述呼入拦截模块520进一步用于:
启动基于电话黑名单的呼入拦截操作,所述电话黑名单中设置有预设主叫电话号码;监控所述呼入拦截操作拦截的主叫电话号码。
可选的,如图6所示,所述装置还包括:
备选身份验证启动模块540,用于启动呼入拦截计时,并在呼入拦截计时超出预设阈值后启动备选身份验证流程。
可选的,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
本公开实施例公开的身份验证装置,通过根据用户的身份验证操作,向验证服务器发送身份验证请求,并启动对预设主叫电话号码的呼入拦截;当拦截到所述主叫电话号码的呼入时,将拦截的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对当前用户进行身份验证,解决了现有技术中的身份验证方法存在的过程复杂,容易出错的问题。通过将用于身份验证的主叫电话号码写入电话黑名单,进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。并且,身份验证的过程在用户启动身份验证之后,后续验证过程静默执行,不打断用户正常执行的操作流程,进一步提升了用户体验。
通过对呼入拦截进行超时监控,能够在呼入拦截失败后立刻启动备选身份验证流程,提高身份验证效率。通过与语音网络电话系统相结合,随机生成语音网络电话号码作为身份验证码,可以增加身份验证码的破解难度,进一步提高身份验证系统的安全性。
实施例五
相应的,本公开实施例公开的一种身份验证装置,如图7所示,所述装置包括:
主叫电话号码生成模块700,用于根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;
验证呼入模块710,用于以所述主叫电话号码生成模块700生成的主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;
身份验证码接收模块720,用于接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码;
身份验证模块730,用于基于所述身份验证码接收模块720接收到的所述身份验证码和所述主叫电话号码生成模块700生成的主叫电话号码,对所述客户端的当前用户进行身份验证。
可选的,所述主叫电话号码生成模块700进一步用于:
根据接收到的来自客户端的身份验证请求,随机生成一预设长度的第一数字串;
将所述第一数字串和预设数字串按照预设规则进行组合,生成一主叫电话号码。
可选的,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
可选的,所述身份验证模块730进一步用于:
将所述身份验证码和生成的所述主叫电话号码进行比较,若匹配,则身份验证通过。
本公开实施例公开的身份验证装置,通过根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;然后,基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证,所述身份验证码为客户端拦截的用于身份验证的主叫电话号码,解决了现有技术中的身份验证方法存在的过程复杂,容易出错的问题。通过将用于身份验证的主叫电话号码写入电话黑名单,进行自动拦截,并将其作为身份验证码发送至服务器,不需要用户记忆并转录身份验证码,简化了验证流程,并且杜绝了输入错误验证码的可能,进一步,提高了身份验证的效率。
相应的,本公开还公开了一种电子设备,如图8所示,该电子设备包括存储介质801、处理器802,该存储介质801存储有处理器802可运行的机器可执行指令,所述处理器802执行所述机器可执行指令时实现如本公开实施例一至实施例三所述的身份验证方法。所述电子设备可以为移动终端、具有电话呼入功能的智能电话、导航仪、个人数字助理、平板电脑等。
本公开还公开了一种机器可读存储介质,其上存储有机器可执行指令,该机器可执行指令被处理器执行时实现如本公开实施例一至实施例三所述的身份验证方法的步骤。
本公开中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上对本公开提供的一种身份验证方法及装置进行了详细介绍,本文中应用了具体个例对本公开的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本公开的方法及其核心思想;同时,对于本领域的一般技术人员,依据本公开的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本公开的限制。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式 可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件实现。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。

Claims (18)

  1. 一种身份验证方法,包括:
    客户端根据用户的身份验证操作,向验证服务器发送身份验证请求;
    所述客户端启动呼入拦截;
    当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,所述客户端将拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对所述用户进行身份验证。
  2. 根据权利要求1所述的方法,其中,启动所述呼入拦截,包括:
    所述客户端启动电话黑名单的呼入拦截操作,所述电话黑名单中设置有所述主叫电话号码;
    所述客户端监控被所述呼入拦截操作拦截的主叫电话号码。
  3. 根据权利要求1所述的方法,其中,还包括:
    所述客户端启动呼入拦截计时,并
    在所述呼入拦截计时超出预设阈值后,所述客户端启动备选身份验证流程。
  4. 根据权利要求1至3任一项所述的方法,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
  5. 一种身份验证方法,包括:
    服务器根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;
    所述服务器以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;
    所述服务器接收所述客户端发送的身份验证码,所述身份验证码为所述客户端拦截的用于身份验证的主叫电话号码;
    所述服务器基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证。
  6. 根据权利要求5所述的方法,其中,根据接收到的来自客户端的所述身份验证请求,生成符合预设规则的所述主叫电话号码,包括:
    所述服务器根据接收到的来自客户端的所述服务器身份验证请求,随机生成一预设长度的第一数字串;
    所述服务器将所述第一数字串和预设数字串按照预设规则进行组合,生成所述主叫电话号码。
  7. 根据权利要求5或6所述的方法,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
  8. 根据权利要求7所述的方法,其中,基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证包括:
    所述服务器将所述身份验证码和生成的所述主叫电话号码进行比较,
    若所述身份验证码和生成的所述主叫电话号码相互匹配,则所述服务器确定身份验证通过。
  9. 一种身份验证装置,包括:
    身份验证请求发送模块,用于根据用户的身份验证操作,向验证服务器发送身份验证请求;
    呼入拦截模块,用于启动呼入拦截;
    身份验证模块,用于当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,将所述呼入拦截模块拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对所述用户进行身份验证。
  10. 根据权利要求9所述的装置,其中,所述呼入拦截模块进一步用于:
    启动电话黑名单的呼入拦截操作,所述电话黑名单中设置有所述主叫电话号码;
    监控被所述呼入拦截操作拦截的主叫电话号码。
  11. 根据权利要求9所述的装置,其中,还包括:
    备选身份验证启动模块,用于启动呼入拦截计时,并在呼入拦截计时超出预设阈值后启动备选身份验证流程。
  12. 根据权利要求9至11任一项所述的装置,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
  13. 一种身份验证装置,包括:
    主叫电话号码生成模块,用于根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;
    验证呼入模块,用于以所述主叫电话号码生成模块生成的主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;
    身份验证码接收模块,用于接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截到的用于身份验证的主叫电话号码;
    身份验证模块,用于基于所述身份验证码接收模块接收到的所述身份验证码和所述主叫电话号码生成模块生成的主叫电话号码,对所述客户端的当前用户进行身份验证。
  14. 根据权利要求13所述的装置,其中,所述主叫电话号码生成模块进一步用于:
    根据接收到的来自客户端的服务器身份验证请求,随机生成一预设长度的第一数字串;
    将所述第一数字串和预设数字串按照预设规则进行组合,生成所述主叫电话号码。
  15. 根据权利要求13或14所述的装置,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
  16. 根据权利要求15所述的装置,其中,所述身份验证模块进一步用于:
    将所述身份验证码和生成的所述主叫电话号码进行比较,若所述身份验证码和生成的所述主叫电话号码相互匹配,则确定身份验证通过。
  17. 一种电子设备,包括:
    处理器;以及
    非暂时性存储介质,其中,所述非暂时性存储介质上存储有所述处理器上可运行的机器可执行指令,其中,通过读取并执行所述机器可执行指令,所述处理器被使得执行如权利要求1至8任意一项所述的身份验证方法。
  18. 一种机器可读存储介质,其上存储有机器可执行指令,其中,所述机器可执行指令被处理器执行时实现权利要求1至8任意一项所述的身份验证方法。
PCT/CN2017/119772 2017-06-28 2017-12-29 一种身份验证方法及装置,电子设备 WO2019000885A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US16/618,339 US20210144247A1 (en) 2017-06-28 2017-12-29 Identity verification method and apparatus and electronic device
JP2019566352A JP2020523671A (ja) 2017-06-28 2017-12-29 身元認証方法及び装置、電子機器
EP17915324.2A EP3618379A4 (en) 2017-06-28 2017-12-29 IDENTITY VERIFICATION METHOD AND DEVICE AND ELECTRONIC DEVICE
KR1020197035663A KR20200003162A (ko) 2017-06-28 2017-12-29 신원 인증 방법 및 장치, 전자 기기
CA3064797A CA3064797A1 (en) 2017-06-28 2017-12-29 Identity verification method and apparatus, and electronic device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710508830.9A CN107483398B (zh) 2017-06-28 2017-06-28 一种静默验证方法及装置,电子设备
CN201710508830.9 2017-06-28

Publications (1)

Publication Number Publication Date
WO2019000885A1 true WO2019000885A1 (zh) 2019-01-03

Family

ID=60595998

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/119772 WO2019000885A1 (zh) 2017-06-28 2017-12-29 一种身份验证方法及装置,电子设备

Country Status (8)

Country Link
US (1) US20210144247A1 (zh)
EP (1) EP3618379A4 (zh)
JP (1) JP2020523671A (zh)
KR (1) KR20200003162A (zh)
CN (1) CN107483398B (zh)
CA (1) CA3064797A1 (zh)
TW (1) TWI678093B (zh)
WO (1) WO2019000885A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483398B (zh) * 2017-06-28 2019-04-19 北京三快在线科技有限公司 一种静默验证方法及装置,电子设备
CN108564688A (zh) * 2018-03-21 2018-09-21 阿里巴巴集团控股有限公司 身份验证的方法及装置和电子设备
US11783839B2 (en) 2020-10-01 2023-10-10 Pindrop Security, Inc. Enrollment and authentication over a phone call in call centers
CN112954693B (zh) * 2021-02-10 2023-02-24 中国工商银行股份有限公司 身份认证方法、身份认证服务器及终端
CN115102756A (zh) * 2022-06-20 2022-09-23 上海磐御网络科技有限公司 一种基于密码令牌的主叫用户身份鉴别技术

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286985A (zh) * 2008-04-19 2008-10-15 雷体文 一种利用电话进行身份验证的系统及方法
WO2009070529A1 (en) * 2007-11-27 2009-06-04 Alibaba Group Holding Limited Verifying user identity using a reverse caller id process
CN102958022A (zh) * 2012-11-23 2013-03-06 深圳市朗科科技股份有限公司 短信验证方法、装置及系统
CN107483398A (zh) * 2017-06-28 2017-12-15 北京三快在线科技有限公司 一种静默验证方法及装置,电子设备

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004208030A (ja) * 2002-12-25 2004-07-22 Casio Comput Co Ltd 通信システム
JP5239458B2 (ja) * 2008-03-31 2013-07-17 富士通株式会社 生体認証装置および生体認証プログラム
US8249571B2 (en) * 2009-02-20 2012-08-21 Qualcomm Iskoot, Inc. Method and system for mobile call conferencing
CN102892117A (zh) * 2012-09-11 2013-01-23 北京中创信测科技股份有限公司 一种骚扰电话监控系统方法及系统
CN103152739A (zh) * 2013-02-06 2013-06-12 北京奇虎科技有限公司 一种移动终端通话请求信息处理的方法、装置及系统
CN103533192A (zh) * 2013-10-22 2014-01-22 上海市共进通信技术有限公司 基于SIP协议的VoIP家庭网关实现电话免打扰功能的方法
CN105100364B (zh) * 2014-04-28 2019-03-01 北京奇虎科技有限公司 一种在通讯设备上进行来电拦截的方法和装置
CN105307158B (zh) * 2014-07-25 2019-01-29 北京科能腾达通信技术有限公司 一种通信终端的手机号码的身份验证方法
ES2817936T3 (es) * 2015-03-25 2021-04-08 Sinch Mobile Ab Métodos y sistemas para verificar usuarios mediante números de teléfono
JP2016192023A (ja) * 2015-03-31 2016-11-10 株式会社野村総合研究所 認証システム、認証方法および認証プログラム
CN106302950A (zh) * 2015-05-18 2017-01-04 联想移动通信科技有限公司 一种通话验证方法、装置及移动终端
CN105915517A (zh) * 2016-04-18 2016-08-31 杭州诚智天扬科技有限公司 一种语音验证码业务的实现方法
CN105721511B (zh) * 2016-05-05 2019-05-21 杭州晴山信息技术有限公司 一种移动终端的身份验证方法
CN106657547A (zh) * 2016-09-28 2017-05-10 武汉工程大学 一种防止骚扰电话的方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009070529A1 (en) * 2007-11-27 2009-06-04 Alibaba Group Holding Limited Verifying user identity using a reverse caller id process
CN101286985A (zh) * 2008-04-19 2008-10-15 雷体文 一种利用电话进行身份验证的系统及方法
CN102958022A (zh) * 2012-11-23 2013-03-06 深圳市朗科科技股份有限公司 短信验证方法、装置及系统
CN107483398A (zh) * 2017-06-28 2017-12-15 北京三快在线科技有限公司 一种静默验证方法及装置,电子设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3618379A4 *

Also Published As

Publication number Publication date
US20210144247A1 (en) 2021-05-13
CN107483398A (zh) 2017-12-15
KR20200003162A (ko) 2020-01-08
JP2020523671A (ja) 2020-08-06
TWI678093B (zh) 2019-11-21
TW201906367A (zh) 2019-02-01
EP3618379A4 (en) 2020-06-03
CN107483398B (zh) 2019-04-19
CA3064797A1 (en) 2019-01-03
EP3618379A1 (en) 2020-03-04

Similar Documents

Publication Publication Date Title
US11856132B2 (en) Validating automatic number identification data
WO2019000885A1 (zh) 一种身份验证方法及装置,电子设备
US9848328B2 (en) User authentication in a mobile environment
US9722984B2 (en) Proximity-based authentication
JP6130086B1 (ja) デュアルトーン・マルチ周波数シグナリングを用いたモバイル・デバイス認証および呼ルーティング
US8861692B1 (en) Web call access and egress to private network
US10742652B2 (en) Mobile caller authentication for contact centers
WO2017000476A1 (zh) 语音验证方法、装置以及系统
TW201914256A (zh) 一種身份驗證方法、裝置及電子設備
RU2570838C2 (ru) Строгая аутентификация посредством предоставления номера
TW201014315A (en) User identity authentication method, system thereof and identifying code generating maintenance subsystem
US11042613B2 (en) Enhanced user authentication based on device usage characteristics for interactions using blockchains
US20200396331A1 (en) Call authentication at the call center using a mobile device
US10148816B2 (en) Interactive voice response (IVR) call authentication
JP2015099470A (ja) 認証システム、方法、サーバ及びプログラム
CN112968892A (zh) 信息的验证方法、装置、计算设备和介质
WO2018099407A1 (zh) 账户认证登录方法及装置
JP2016149636A (ja) 認証装置、電話端末、認証方法および認証プログラム
TWI462562B (zh) 用於一語音通訊系統中交換資訊與控管的方法及相關裝置
CN103916403A (zh) 支持sip协议的免输入密码客户端的登录方法
JP6115884B1 (ja) サービス提供システム、認証装置、及びプログラム
JP6214781B2 (ja) 接続システム及び接続方法
EP3852330A1 (en) Telephone call authentication
JP5495333B2 (ja) 認証装置、認証システム、認証方法、およびプログラム
EP2755372A1 (en) Validating communications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17915324

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 3064797

Country of ref document: CA

ENP Entry into the national phase

Ref document number: 2019566352

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20197035663

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017915324

Country of ref document: EP

Effective date: 20191129

NENP Non-entry into the national phase

Ref country code: DE