WO2019000885A1 - 一种身份验证方法及装置,电子设备 - Google Patents
一种身份验证方法及装置,电子设备 Download PDFInfo
- Publication number
- WO2019000885A1 WO2019000885A1 PCT/CN2017/119772 CN2017119772W WO2019000885A1 WO 2019000885 A1 WO2019000885 A1 WO 2019000885A1 CN 2017119772 W CN2017119772 W CN 2017119772W WO 2019000885 A1 WO2019000885 A1 WO 2019000885A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identity verification
- client
- authentication
- calling
- telephone number
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/304—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6045—Identity confirmation
Definitions
- the present disclosure relates to the field of identity verification.
- Verification code verification has become an important means of authentication.
- the verification code is usually sent by SMS, or the voice verification code is sent by VOIP (Voice over Internet Protocol), and then the user transcribes the received verification code and submits the verification to complete the verification process.
- VOIP Voice over Internet Protocol
- the logistics system will send a voice verification code to the mobile phone number input by the client, and the user will confirm the receipt after inputting the correct voice verification code on the client.
- the embodiments of the present disclosure provide an identity verification method, which solves the problem that the process of the identity verification method in the prior art is complicated and error-prone.
- an embodiment of the present disclosure provides an identity verification method, including:
- the client sends an authentication request to the authentication server according to the user's authentication operation
- the client initiates an incoming call interception
- the client When the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, the client sends the intercepted calling telephone number as an authentication code to the authentication server. , used to authenticate the user.
- an identity verification apparatus including:
- An authentication request sending module configured to send an authentication request to the verification server according to the user's identity verification operation
- An incoming interception module for initiating an incoming interception
- An authentication module configured to: when the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, the calling telephone number intercepted by the incoming intercepting module is used as An authentication code is sent to the verification server for authenticating the user.
- an embodiment of the present disclosure provides an identity verification method, including:
- the server generates a calling phone number that meets a preset rule according to the received identity verification request from the client;
- the server performs an incoming call operation on the phone number pre-registered by the current user of the client by using the calling phone number;
- an identity verification code sent by the client where the identity verification code is a calling phone number used by the client for identity verification;
- the server authenticates the current user of the client based on the received identity verification code and the generated calling phone number.
- an identity verification apparatus including:
- a calling telephone number generating module configured to generate a calling telephone number that meets a preset rule according to the received identity verification request from the client;
- the verification call module is configured to perform an incoming call operation on the phone number pre-registered by the current user of the client by using the calling phone number generated by the calling phone number generation module;
- An authentication code receiving module configured to receive an identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification;
- the identity verification module is configured to perform identity verification on the current user of the client based on the identity verification code received by the identity verification code receiving module and the calling phone number generated by the calling number generation module.
- an embodiment of the present disclosure provides an electronic device, including a storage medium, a processor, and the machine executable instructions executable by the processor, where the processor executes the machine
- the identity verification method described in the embodiment of the present disclosure is implemented when the instruction is executed.
- an embodiment of the present disclosure provides a machine readable storage medium having stored thereon a computer program, the program being executed by a processor to implement the steps of the identity verification method according to the embodiment of the present disclosure.
- the identity verification method disclosed in the embodiment of the present disclosure sends an identity verification request to the verification server according to the user operation, and initiates an incoming call interception operation on the preset calling telephone number; when the incoming call is intercepted to the calling telephone number
- the intercepted call phone number is sent to the verification server as an authentication code for authenticating the current user, which solves the problem that the process of the identity verification method in the prior art is complicated and error-prone.
- the user is not required to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the possibility of entering an incorrect verification code. Further, the efficiency of authentication is improved.
- the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
- FIG. 1 is a flowchart of an identity verification method according to an embodiment of the present disclosure
- FIG. 2 is a flowchart of an identity verification method according to an embodiment of the present disclosure
- FIG. 3 is a flowchart of an identity verification method according to an embodiment of the present disclosure.
- FIG. 4 is a schematic diagram of an application scenario of an identity verification method according to an embodiment of the present disclosure.
- FIG. 5 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present disclosure.
- FIG. 6 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present disclosure.
- FIG. 7 is a schematic structural diagram of an identity verification apparatus according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
- the present disclosure provides an authentication method that can be applied to devices where a client is located, such as a mobile phone, a smart phone, a PAD with a phone function, an electronic device with a phone function, and the like. As shown in FIG. 1, the method includes: Step 110 to Step 130.
- Step 110 Send an identity verification request to the verification server according to the user's identity verification operation.
- the business system For some application service products that need to judge the authenticity of the user, the business system requires the user to perform identity verification when the user registers or when the user performs a risky operation. For example, for an online shopping application, the business system must determine the authenticity of the user information in order to accept the user's order. Therefore, when the user performs a user registration operation on the client of the application, or when the user submits an order through the client of the application, Users need to be authenticated to ensure the authenticity of user information.
- the client on the client side of the app, you can set up a button (softkey or hardkey) for authentication to initiate authentication. After the user presses the button for initiating authentication, the client will generate an authentication request and send the authentication request to the authentication server.
- the client identifier may be carried in the identity verification request.
- the identity verification request may carry identity information of a current user of the client, such as a username.
- the application scenario for authentication is not limited to online shopping, but also has a wider range of applications, which are not enumerated here.
- the operation of the user to initiate authentication is not limited to the user registration or submission of an order, and the present disclosure does not limit the operation of initiating the authentication.
- step 120 the incoming call interception is initiated.
- the device where the client is located can have the function of receiving incoming calls, such as a mobile phone, a smart phone, a PAD with a telephone function, a navigation device with a telephone function, and the like can receive incoming calls.
- the identity verification method of the present disclosure is described by taking the device where the client is located as a smart phone as an example.
- incoming call interception can be performed by calling a system interface (for example, an incoming call processing interface), or incoming call interception can be performed by a telephone blacklist function.
- the system interface mentioned in this article may be an API interface provided by an operating system such as Android or iOS, and is not restrictive.
- the phone blacklist can be set first on the device where the client is located.
- the client automatically adds a set of preset calling phone numbers to the device's phone blacklist.
- the preset calling telephone number may be an ordinary telephone number, or may be a telephone number that conforms to a preset rule, for example, a voice network telephone number that conforms to a preset rule.
- the preset calling number may be intercepted and monitored by other methods, which is not limited in this disclosure.
- Step 130 When the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, send the intercepted calling telephone number as an identity verification code to the verification server, Authenticating the user.
- the system When an incoming call is performed on the device where the client is located by using the preset calling phone number, the system will actively intercept the incoming call initiated by the calling phone number, and the device where the client is located will not have an incoming call prompt or ringing, and there will be no Traffic charges are generated. Meanwhile, when intercepting the incoming call, the client may invoke the system interface to obtain the intercepted calling telephone number, and the intercepted calling telephone number and the calling telephone stored by the client for authentication. The number is matched. If the matching is successful, the calling phone number is sent to the verification server as an authentication code for identity verification.
- the incoming call interception of the preset calling telephone number may be initiated, and then the authentication request may be sent to the authentication server; or the incoming interception of the preset calling telephone number may be initiated and the identity sent to the authentication server may be simultaneously performed.
- the present disclosure does not limit the order of execution of the two steps.
- the identity verification method disclosed in the embodiment of the present disclosure sends an identity verification request to the verification server according to the identity verification operation of the user, and initiates an incoming call interception to the preset calling phone number; when the preset calling phone is intercepted When the number is forwarded, the intercepted caller number is sent to the verification server as an authentication code for authenticating the current user, which solves the complicated process of the identity verification method in the prior art.
- An error-prone problem By automatically intercepting the preset calling phone number and sending it to the server as an authentication code, the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the possibility of inputting a wrong verification code. Further, Improve the efficiency of authentication. Moreover, after the user initiates the identity verification process, the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
- An identity verification method disclosed in another embodiment of the present disclosure includes: Step 210 to Step 270.
- Step 210 Send an identity verification request to the verification server according to the identity verification operation of the user.
- the authentication request sent by the client can include a client identification.
- the verification server may determine an identity of the current user logged in to the client according to the client identifier, such as a username, and further determine a phone number pre-registered by the current user, such as 13612345678.
- the verification server may automatically generate a numeric string of a preset length. For example, the verification server generates a 5-digit numeric string "00001". Then, the digital string can be combined with a preset prefix, such as 10123, into a calling telephone number according to a preset rule, such as 1012300001.
- the verification server can invoke the voice network telephony service to call the telephone number, such as 1012300001, to perform an incoming call operation to the current user's telephone number, such as 13612345678.
- the verification server can store the matching relationship between the client identifier and the generated calling telephone number, which is convenient for identity verification.
- the client may prompt the user to input a phone number for authentication by using a pop-up edit box.
- step 220 the incoming call interception is initiated.
- initiating the incoming call interception may include: initiating a call blacklist-based incoming call interception operation, wherein the call blacklist is provided with a preset calling telephone number; and monitoring the calling telephone number intercepted by the incoming interception operation.
- the preset calling telephone number can be first written into the telephone blacklist.
- the client can automatically add the calling phone number used for authentication to the phone blacklist of the device.
- the calling telephone number for authentication can be stored in the storage medium of the device on which the client is located.
- the client reads the phone blacklist of the device (eg, mobile phone) and determines whether the calling phone number that the user authenticates is already stored in the phone. In the blacklist. If the latest calling phone number for authentication is not stored in the phone blacklist of the device where the client is located, the calling phone number for authentication performed by the client is added to the phone blacklist.
- the client may first send a request to the authentication server to update the calling phone number for authentication, and update the calling phone number obtained from the server to the phone blacklist.
- the calling telephone number used for authentication may be a normal telephone number or a telephone number that conforms to a preset rule, such as a group voice network telephone number from 1012300001 to 1012399999.
- the preset rule may be a phone number length and/or a phone number prefix.
- the calling telephone number includes: a voice network telephone number matching a preset rule.
- the incoming call interception operation of the phone blacklist can be initiated.
- the blacklist function can be initiated by calling the system interface. After the blacklist function is enabled, the system will filter the incoming calls of the calling number in the blacklist, generate an incoming interception event, and record the intercepted calling number.
- the client can monitor the calling telephone number intercepted by the incoming interception operation in real time. For example, the client can implement the incoming call interception monitoring by monitoring the incoming call event of the system or setting a hook function in the incoming call processing process of the system, and obtaining the calling telephone number intercepted by the system.
- step 230 the incoming interception timing is started.
- the present disclosure may set the incoming call interception timing. For example, after initiating the interception interception monitoring of the calling telephone number, the incoming interception timing is started immediately, and the alternate authentication process is initiated after the incoming interception timing exceeds a preset threshold.
- step 240 it is determined whether the incoming call of the calling telephone number is intercepted, and if yes, step 250 is performed; otherwise, step 260 is performed.
- the period determines whether the incoming call to the calling telephone number is intercepted, and when the incoming call to the calling telephone number is intercepted, the calling telephone number to be intercepted is intercepted.
- the authentication code is sent to the verification server for authenticating the current user. If the incoming call that does not monitor the calling telephone number is intercepted, it is determined whether the incoming interception timing exceeds a preset threshold.
- the intercepted calling telephone number can be obtained by calling the interface provided by the system, and then the obtained intercepted calling telephone number is compared with the calling telephone number stored by the client for authentication, and determined. Whether the incoming call of the authenticated calling telephone number is blocked.
- Step 250 Send the intercepted calling phone number as an authentication code to the verification server for authenticating the current user.
- the client sends "1012300003" as an authentication code to the authentication server. For authentication by the authentication server.
- the client sends the authentication code to the authentication server and can also send the client identifier.
- an incoming call interception monitoring operation is completed. That is, one authentication ends.
- Step 260 Determine whether the incoming interception timing exceeds a preset threshold. If yes, execute step 270; otherwise, go to step 240.
- the client sends the intercepted calling telephone number as an authentication code to the verification server for identity verification
- the incoming interception timing is started, and when the incoming interception timing exceeds a preset threshold Then initiate an alternate authentication process.
- the timing threshold can be set to 60 seconds. If the incoming call for monitoring the calling telephone number for user authentication is not intercepted within 60 seconds, the incoming interception is considered to be unsuccessful, and the alternative authentication process is initiated.
- step 270 an alternate authentication process is initiated.
- the initiated alternative authentication process may send a verification code verification process for the short message. At this point, the authentication ends.
- the server may search for the calling phone number corresponding to the client identifier of the current client from the matching relationship between the stored client identifier and the authentication code, and query the calling party. The phone number is compared with the authentication code, and if it matches, the identity verification of the current user of the client passes. After the authentication is passed, the authentication server notifies the client that the authentication is passed by sending a message or a preset instruction. If the client does not receive a client authentication pass notification sent by the authentication server before the timeout expires, the authentication is considered to have failed.
- the identity verification method disclosed in the embodiment of the present disclosure by writing a set of preset calling phone numbers for identity verification into a phone blacklist; according to the user's identity verification operation, sending an identity verification request to the authentication server, and starting the opposite
- the incoming call interception of the preset calling telephone number group when the incoming call of a calling telephone number in the calling telephone number group is intercepted, the calling telephone number of the intercepting belt is sent as an authentication code
- the verification server is used for authenticating the current user, which solves the problem that the existing authentication method in the prior art is complicated and error-prone.
- the user By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code, the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
- the possibility of entering an error verification code further increases the efficiency of authentication.
- the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
- an alternative authentication process can be initiated immediately after the incoming interception fails, thereby improving the efficiency of authentication.
- the voice network telephone number is randomly generated as the identity verification code, which can increase the difficulty of cracking the identity verification code and further improve the security of the identity verification system.
- An identity verification method disclosed in another embodiment of the present disclosure includes: Step 300 to Step 330.
- Step 300 Generate a calling phone number that meets a preset rule according to the received identity verification request from the client.
- the business system For some application service products that need to judge the authenticity of the user, the business system requires the user to perform identity verification when the user registers or when the user performs a risky operation. For example, for an online shopping application, the business system must determine the authenticity of the user information in order to accept the user's order. Therefore, when the user performs a user registration operation on the client of the application, or when the user submits an order through the client of the application, Users need to be authenticated to ensure the authenticity of user information.
- the client On the client side of the app, you can set up a button for authentication (soft or hard) to initiate authentication. After the user presses the button for initiating authentication, the client will generate an authentication request and send the authentication request to the authentication server.
- the client identifier may be carried in the authentication request.
- the identity verification request may carry identity information of a current user of the client, such as a username.
- Generating a calling phone number that meets a preset rule according to the received identity verification request from the client including: randomly generating a first digit string of a preset length according to the received identity verification request from the client; The first digit string and the preset digit string are combined according to a preset rule to generate a calling telephone number.
- the first digit string of a preset length may be automatically generated randomly.
- the verification server may generate a 5-digit string "00001".
- the first digit string can then be combined with a preset number string according to a preset rule.
- the preset rule can be: phone number length and/or phone number prefix; phone number length and/or phone number suffix. Taking the telephone number length of the preset rule as 10 digits and the telephone number prefix as the digit string 10123 as an example, the first digit string "00001" generated by the verification server can be combined with the preset telephone number prefix as a calling party. Phone number, such as 1012300001.
- the calling telephone number may include: a voice network telephone number matching a preset rule.
- the telephone number may be 5 digits or 6 digits in length, and the sum of the length of the preset prefix or suffix and the length of the telephone number conforms to the requirements of the voice network telephone system.
- the generated matching relationship between the calling telephone number and the client can be stored for authentication.
- the verification server After the verification server generates the calling phone number that meets the preset rule according to the authentication request of the client, the generated matching relationship between the calling phone number and the client may be stored for identity verification.
- Step 310 Perform an incoming operation on the phone number pre-registered by the current user of the client by using the calling phone number.
- the verification server can invoke the voice network telephony service to perform an incoming call operation to the current user's telephone number (eg, 13612345678) with the generated calling telephone number (eg, 1012300001).
- the verification server can store the matching relationship between the client identifier and the generated calling telephone number, which is convenient for identity verification. For example, when the user logs in to the client, the authentication server can further obtain the phone number bound by the current user at the time of registration through the user identifier.
- the client may prompt the user to input a phone number for authentication by using a pop-up edit box.
- Step 320 Receive an identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification.
- the authentication server can start the operation of receiving the authentication code sent by the client.
- the incoming interception monitoring can be started at the same time, so as to timely obtain the incoming interception event of the calling telephone number used for authentication in the blacklist of the telephone.
- the calling phone number used for authentication in the phone blacklist includes the calling phone number generated by the authentication server.
- the verification server When the verification server performs an incoming call to the device where the client is located by using the generated calling phone number, the system will actively intercept the incoming call initiated by the calling phone number, and the device where the client is located does not have an incoming call prompt or ringing, There will be traffic charges. Meanwhile, when intercepting the incoming call, the client may invoke the system interface to obtain the intercepted calling telephone number, and the intercepted calling telephone number and the calling telephone stored by the client for authentication. The number is matched. If the matching is successful, the calling phone number is sent to the verification server as an authentication code for identity verification.
- Step 330 Perform identity verification on the current user of the client based on the received identity verification code and the generated calling phone number.
- the verification server After the verification server receives the authentication code sent by the client, the authentication code is verified for consistency with the calling phone number previously generated for the client.
- the authenticating the current user of the client based on the received identity verification code and the generated calling phone number comprises: comparing the identity verification code with the generated calling phone number If it matches, the authentication is passed.
- the calling phone number matched by the client sending the identity verification code may be determined according to the matching relationship between the calling phone number and the client stored on the verification server according to the client identifier; and then the calling phone number is received and received The authentication code is compared. If it matches, the current user identity of the client sending the authentication code passes. Otherwise, the verification failed.
- the identity verification method disclosed in the embodiment of the present disclosure generates a calling phone number that conforms to a preset rule according to the received identity verification request from the client, and pre-registers with the current user of the client by using the calling phone number.
- the phone number performs an incoming call operation; then, based on the received identity verification code and the generated calling phone number, authenticating the current user of the client, where the identity verification code is used by the client to intercept
- the authentication calling telephone number solves the problem that the existing authentication method in the prior art is complicated and error-prone.
- By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
- the possibility of entering an error verification code further increases the efficiency of authentication.
- an identity verification method is further described below in combination with a specific application scenario.
- the method is applied to a service product including a client and an authentication server, and the client and the verification server jointly perform an identity verification method to implement the pair.
- the authentication of the current user of the client For example, as shown in FIG. 4, the specific process of identity verification includes: step 400 to step 470.
- step 400 the client writes the calling phone number for authentication to the phone blacklist.
- Step 410 The client sends an identity verification request to the verification server according to the user operation.
- step 420 the client initiates an incoming interception of the calling telephone number.
- Step 430 The verification server generates a calling telephone number that conforms to the preset rule according to the received identity verification request from the client.
- Step 440 The verification server performs an incoming operation on the phone number pre-registered by the current user of the client by using the calling phone number.
- Step 450 When the client intercepts the incoming call to the calling phone number, the intercepted calling phone number is sent to the verification server as an identity verification code for authenticating the current user.
- the client monitors that the incoming call number of the calling telephone number is intercepted
- the method for transmitting the intercepted calling telephone number as the identity verification code to the authentication server is described in the foregoing Embodiment 1 and Embodiment 2. The relevant steps are not described here.
- Step 460 The verification server receives the identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification.
- the verification server receives the authentication code sent by the client, and the identity verification code is a specific implementation manner of the calling phone number used for the authentication of the client, and the related steps in the foregoing Embodiment 3 are not described herein. .
- Step 470 The verification server performs identity verification on the current user of the client based on the received identity verification code and the generated calling phone number.
- the identity verification method disclosed in the embodiment of the present disclosure by writing a calling phone number for identity verification into a phone blacklist; sending an identity verification request to the authentication server according to a user operation, and starting a call to the calling phone number
- the intercepted calling telephone number is sent to the verification server as an authentication code for authenticating the current user, and the existing
- the authentication method in the technology has a complicated process and is prone to error.
- the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
- the possibility of entering an error verification code further increases the efficiency of authentication.
- the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
- an alternative authentication process can be initiated immediately after the incoming interception fails, thereby improving the efficiency of authentication.
- the voice network telephone number is randomly generated as the identity verification code, which can increase the difficulty of cracking the identity verification code and further improve the security of the identity verification system.
- an identity verification apparatus disclosed in the embodiment of the present disclosure includes:
- the authentication request sending module 510 is configured to send an identity verification request to the verification server according to the identity verification operation of the user;
- the incoming interception module 520 is configured to initiate an incoming call interception
- the authentication module 530 is configured to: when the incoming call of the calling telephone number sent by the verification server in response to the identity verification request is intercepted, use the calling telephone number intercepted by the incoming intercepting module 520 as An authentication code is sent to the verification server for authenticating the current user.
- the apparatus further includes:
- the phone blacklist update module 500 is configured to write the calling phone number used for identity verification into the phone blacklist
- the incoming interception module 520 is further configured to:
- the apparatus further includes:
- the alternate authentication initiation module 540 is configured to initiate an incoming interception timing and initiate an alternate authentication process after the incoming interception timing exceeds a preset threshold.
- the calling phone number includes: a voice network phone number that matches a preset rule.
- the identity verification apparatus disclosed in the embodiment of the present disclosure sends an identity verification request to the verification server according to the identity verification operation of the user, and initiates an incoming call interception to the preset calling telephone number; when the calling telephone number is intercepted
- the intercepted call phone number is sent to the verification server as an authentication code for authenticating the current user, which solves the complicated process of the prior art identity verification method and is prone to error.
- the problem By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code, the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
- the possibility of entering an error verification code further increases the efficiency of authentication.
- the subsequent verification process is silently executed, and the operation process normally performed by the user is not interrupted, thereby further improving the user experience.
- an alternative authentication process can be initiated immediately after the incoming interception fails, thereby improving the efficiency of authentication.
- the voice network telephone number is randomly generated as the identity verification code, which can increase the difficulty of cracking the identity verification code and further improve the security of the identity verification system.
- an identity verification apparatus disclosed in the embodiment of the present disclosure includes:
- the calling phone number generating module 700 is configured to generate a calling phone number that meets a preset rule according to the received identity verification request from the client;
- the verification incoming call module 710 is configured to perform an incoming call operation on the telephone number pre-registered by the current user of the client by using the calling telephone number generated by the calling telephone number generating module 700;
- the authentication code receiving module 720 is configured to receive an identity verification code sent by the client, where the identity verification code is a calling phone number used by the client for identity verification.
- the identity verification module 730 is configured to perform identity on the current user of the client based on the identity verification code received by the identity verification code receiving module 720 and the calling phone number generated by the calling phone number generation module 700. verification.
- the calling phone number generation module 700 is further configured to:
- the first digit string and the preset digit string are combined according to a preset rule to generate a calling telephone number.
- the calling phone number includes: a voice network phone number that matches a preset rule.
- the identity verification module 730 is further configured to:
- the authentication code is compared with the generated calling phone number, and if it matches, the identity verification is passed.
- the identity verification apparatus disclosed in the embodiment of the present disclosure generates a calling telephone number that conforms to a preset rule according to the received identity verification request from the client, and pre-registers with the current user of the client by using the calling telephone number.
- the phone number performs an incoming call operation; then, based on the received identity verification code and the generated calling phone number, authenticating the current user of the client, where the identity verification code is used by the client to intercept
- the authentication calling telephone number solves the problem that the existing authentication method in the prior art is complicated and error-prone.
- By automatically writing the calling phone number used for authentication to the phone blacklist, and automatically sending it to the server as an authentication code the user does not need to memorize and transcribe the authentication code, which simplifies the verification process and eliminates the need for authentication.
- the possibility of entering an error verification code further increases the efficiency of authentication.
- the present disclosure also discloses an electronic device, as shown in FIG. 8, the electronic device includes a storage medium 801, and a processor 802, which stores machine executable instructions executable by the processor 802,
- the processor 802 implements the identity verification method according to the first embodiment to the third embodiment of the present disclosure when the machine executable instructions are executed.
- the electronic device may be a mobile terminal, a smart phone with a phone call function, a navigator, a personal digital assistant, a tablet computer, or the like.
- the present disclosure also discloses a machine readable storage medium having stored thereon machine executable instructions that, when executed by a processor, implement steps of an identity verification method as described in Embodiments 1 through 3 of the present disclosure .
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (18)
- 一种身份验证方法,包括:客户端根据用户的身份验证操作,向验证服务器发送身份验证请求;所述客户端启动呼入拦截;当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,所述客户端将拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对所述用户进行身份验证。
- 根据权利要求1所述的方法,其中,启动所述呼入拦截,包括:所述客户端启动电话黑名单的呼入拦截操作,所述电话黑名单中设置有所述主叫电话号码;所述客户端监控被所述呼入拦截操作拦截的主叫电话号码。
- 根据权利要求1所述的方法,其中,还包括:所述客户端启动呼入拦截计时,并在所述呼入拦截计时超出预设阈值后,所述客户端启动备选身份验证流程。
- 根据权利要求1至3任一项所述的方法,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
- 一种身份验证方法,包括:服务器根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;所述服务器以所述主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;所述服务器接收所述客户端发送的身份验证码,所述身份验证码为所述客户端拦截的用于身份验证的主叫电话号码;所述服务器基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证。
- 根据权利要求5所述的方法,其中,根据接收到的来自客户端的所述身份验证请求,生成符合预设规则的所述主叫电话号码,包括:所述服务器根据接收到的来自客户端的所述服务器身份验证请求,随机生成一预设长度的第一数字串;所述服务器将所述第一数字串和预设数字串按照预设规则进行组合,生成所述主叫电话号码。
- 根据权利要求5或6所述的方法,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
- 根据权利要求7所述的方法,其中,基于接收到的所述身份验证码和生成的所述主叫电话号码,对所述客户端的当前用户进行身份验证包括:所述服务器将所述身份验证码和生成的所述主叫电话号码进行比较,若所述身份验证码和生成的所述主叫电话号码相互匹配,则所述服务器确定身份验证通过。
- 一种身份验证装置,包括:身份验证请求发送模块,用于根据用户的身份验证操作,向验证服务器发送身份验证请求;呼入拦截模块,用于启动呼入拦截;身份验证模块,用于当所述验证服务器响应于所述身份验证请求而发送的主叫电话号码的呼入被拦截时,将所述呼入拦截模块拦截到的所述主叫电话号码作为身份验证码发送至所述验证服务器,用于对所述用户进行身份验证。
- 根据权利要求9所述的装置,其中,所述呼入拦截模块进一步用于:启动电话黑名单的呼入拦截操作,所述电话黑名单中设置有所述主叫电话号码;监控被所述呼入拦截操作拦截的主叫电话号码。
- 根据权利要求9所述的装置,其中,还包括:备选身份验证启动模块,用于启动呼入拦截计时,并在呼入拦截计时超出预设阈值后启动备选身份验证流程。
- 根据权利要求9至11任一项所述的装置,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
- 一种身份验证装置,包括:主叫电话号码生成模块,用于根据接收到的来自客户端的身份验证请求,生成符合预设规则的主叫电话号码;验证呼入模块,用于以所述主叫电话号码生成模块生成的主叫电话号码对所述客户端的当前用户预先注册的电话号码执行呼入操作;身份验证码接收模块,用于接收所述客户端发送的身份验证码,所述身份验证码为客户端拦截到的用于身份验证的主叫电话号码;身份验证模块,用于基于所述身份验证码接收模块接收到的所述身份验证码和所述主叫电话号码生成模块生成的主叫电话号码,对所述客户端的当前用户进行身份验证。
- 根据权利要求13所述的装置,其中,所述主叫电话号码生成模块进一步用于:根据接收到的来自客户端的服务器身份验证请求,随机生成一预设长度的第一数字串;将所述第一数字串和预设数字串按照预设规则进行组合,生成所述主叫电话号码。
- 根据权利要求13或14所述的装置,其中,所述主叫电话号码包括:匹配预设规则的语音网络电话号码。
- 根据权利要求15所述的装置,其中,所述身份验证模块进一步用于:将所述身份验证码和生成的所述主叫电话号码进行比较,若所述身份验证码和生成的所述主叫电话号码相互匹配,则确定身份验证通过。
- 一种电子设备,包括:处理器;以及非暂时性存储介质,其中,所述非暂时性存储介质上存储有所述处理器上可运行的机器可执行指令,其中,通过读取并执行所述机器可执行指令,所述处理器被使得执行如权利要求1至8任意一项所述的身份验证方法。
- 一种机器可读存储介质,其上存储有机器可执行指令,其中,所述机器可执行指令被处理器执行时实现权利要求1至8任意一项所述的身份验证方法。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/618,339 US20210144247A1 (en) | 2017-06-28 | 2017-12-29 | Identity verification method and apparatus and electronic device |
JP2019566352A JP2020523671A (ja) | 2017-06-28 | 2017-12-29 | 身元認証方法及び装置、電子機器 |
EP17915324.2A EP3618379A4 (en) | 2017-06-28 | 2017-12-29 | IDENTITY VERIFICATION METHOD AND DEVICE AND ELECTRONIC DEVICE |
KR1020197035663A KR20200003162A (ko) | 2017-06-28 | 2017-12-29 | 신원 인증 방법 및 장치, 전자 기기 |
CA3064797A CA3064797A1 (en) | 2017-06-28 | 2017-12-29 | Identity verification method and apparatus, and electronic device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710508830.9A CN107483398B (zh) | 2017-06-28 | 2017-06-28 | 一种静默验证方法及装置,电子设备 |
CN201710508830.9 | 2017-06-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019000885A1 true WO2019000885A1 (zh) | 2019-01-03 |
Family
ID=60595998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/119772 WO2019000885A1 (zh) | 2017-06-28 | 2017-12-29 | 一种身份验证方法及装置,电子设备 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20210144247A1 (zh) |
EP (1) | EP3618379A4 (zh) |
JP (1) | JP2020523671A (zh) |
KR (1) | KR20200003162A (zh) |
CN (1) | CN107483398B (zh) |
CA (1) | CA3064797A1 (zh) |
TW (1) | TWI678093B (zh) |
WO (1) | WO2019000885A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483398B (zh) * | 2017-06-28 | 2019-04-19 | 北京三快在线科技有限公司 | 一种静默验证方法及装置,电子设备 |
CN108564688A (zh) * | 2018-03-21 | 2018-09-21 | 阿里巴巴集团控股有限公司 | 身份验证的方法及装置和电子设备 |
US11783839B2 (en) | 2020-10-01 | 2023-10-10 | Pindrop Security, Inc. | Enrollment and authentication over a phone call in call centers |
CN112954693B (zh) * | 2021-02-10 | 2023-02-24 | 中国工商银行股份有限公司 | 身份认证方法、身份认证服务器及终端 |
CN115102756A (zh) * | 2022-06-20 | 2022-09-23 | 上海磐御网络科技有限公司 | 一种基于密码令牌的主叫用户身份鉴别技术 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286985A (zh) * | 2008-04-19 | 2008-10-15 | 雷体文 | 一种利用电话进行身份验证的系统及方法 |
WO2009070529A1 (en) * | 2007-11-27 | 2009-06-04 | Alibaba Group Holding Limited | Verifying user identity using a reverse caller id process |
CN102958022A (zh) * | 2012-11-23 | 2013-03-06 | 深圳市朗科科技股份有限公司 | 短信验证方法、装置及系统 |
CN107483398A (zh) * | 2017-06-28 | 2017-12-15 | 北京三快在线科技有限公司 | 一种静默验证方法及装置,电子设备 |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004208030A (ja) * | 2002-12-25 | 2004-07-22 | Casio Comput Co Ltd | 通信システム |
JP5239458B2 (ja) * | 2008-03-31 | 2013-07-17 | 富士通株式会社 | 生体認証装置および生体認証プログラム |
US8249571B2 (en) * | 2009-02-20 | 2012-08-21 | Qualcomm Iskoot, Inc. | Method and system for mobile call conferencing |
CN102892117A (zh) * | 2012-09-11 | 2013-01-23 | 北京中创信测科技股份有限公司 | 一种骚扰电话监控系统方法及系统 |
CN103152739A (zh) * | 2013-02-06 | 2013-06-12 | 北京奇虎科技有限公司 | 一种移动终端通话请求信息处理的方法、装置及系统 |
CN103533192A (zh) * | 2013-10-22 | 2014-01-22 | 上海市共进通信技术有限公司 | 基于SIP协议的VoIP家庭网关实现电话免打扰功能的方法 |
CN105100364B (zh) * | 2014-04-28 | 2019-03-01 | 北京奇虎科技有限公司 | 一种在通讯设备上进行来电拦截的方法和装置 |
CN105307158B (zh) * | 2014-07-25 | 2019-01-29 | 北京科能腾达通信技术有限公司 | 一种通信终端的手机号码的身份验证方法 |
ES2817936T3 (es) * | 2015-03-25 | 2021-04-08 | Sinch Mobile Ab | Métodos y sistemas para verificar usuarios mediante números de teléfono |
JP2016192023A (ja) * | 2015-03-31 | 2016-11-10 | 株式会社野村総合研究所 | 認証システム、認証方法および認証プログラム |
CN106302950A (zh) * | 2015-05-18 | 2017-01-04 | 联想移动通信科技有限公司 | 一种通话验证方法、装置及移动终端 |
CN105915517A (zh) * | 2016-04-18 | 2016-08-31 | 杭州诚智天扬科技有限公司 | 一种语音验证码业务的实现方法 |
CN105721511B (zh) * | 2016-05-05 | 2019-05-21 | 杭州晴山信息技术有限公司 | 一种移动终端的身份验证方法 |
CN106657547A (zh) * | 2016-09-28 | 2017-05-10 | 武汉工程大学 | 一种防止骚扰电话的方法及系统 |
-
2017
- 2017-06-28 CN CN201710508830.9A patent/CN107483398B/zh active Active
- 2017-12-29 US US16/618,339 patent/US20210144247A1/en not_active Abandoned
- 2017-12-29 EP EP17915324.2A patent/EP3618379A4/en not_active Withdrawn
- 2017-12-29 WO PCT/CN2017/119772 patent/WO2019000885A1/zh unknown
- 2017-12-29 CA CA3064797A patent/CA3064797A1/en active Pending
- 2017-12-29 KR KR1020197035663A patent/KR20200003162A/ko not_active Application Discontinuation
- 2017-12-29 JP JP2019566352A patent/JP2020523671A/ja active Pending
-
2018
- 2018-06-26 TW TW107121918A patent/TWI678093B/zh not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009070529A1 (en) * | 2007-11-27 | 2009-06-04 | Alibaba Group Holding Limited | Verifying user identity using a reverse caller id process |
CN101286985A (zh) * | 2008-04-19 | 2008-10-15 | 雷体文 | 一种利用电话进行身份验证的系统及方法 |
CN102958022A (zh) * | 2012-11-23 | 2013-03-06 | 深圳市朗科科技股份有限公司 | 短信验证方法、装置及系统 |
CN107483398A (zh) * | 2017-06-28 | 2017-12-15 | 北京三快在线科技有限公司 | 一种静默验证方法及装置,电子设备 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3618379A4 * |
Also Published As
Publication number | Publication date |
---|---|
US20210144247A1 (en) | 2021-05-13 |
CN107483398A (zh) | 2017-12-15 |
KR20200003162A (ko) | 2020-01-08 |
JP2020523671A (ja) | 2020-08-06 |
TWI678093B (zh) | 2019-11-21 |
TW201906367A (zh) | 2019-02-01 |
EP3618379A4 (en) | 2020-06-03 |
CN107483398B (zh) | 2019-04-19 |
CA3064797A1 (en) | 2019-01-03 |
EP3618379A1 (en) | 2020-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11856132B2 (en) | Validating automatic number identification data | |
WO2019000885A1 (zh) | 一种身份验证方法及装置,电子设备 | |
US9848328B2 (en) | User authentication in a mobile environment | |
US9722984B2 (en) | Proximity-based authentication | |
JP6130086B1 (ja) | デュアルトーン・マルチ周波数シグナリングを用いたモバイル・デバイス認証および呼ルーティング | |
US8861692B1 (en) | Web call access and egress to private network | |
US10742652B2 (en) | Mobile caller authentication for contact centers | |
WO2017000476A1 (zh) | 语音验证方法、装置以及系统 | |
TW201914256A (zh) | 一種身份驗證方法、裝置及電子設備 | |
RU2570838C2 (ru) | Строгая аутентификация посредством предоставления номера | |
TW201014315A (en) | User identity authentication method, system thereof and identifying code generating maintenance subsystem | |
US11042613B2 (en) | Enhanced user authentication based on device usage characteristics for interactions using blockchains | |
US20200396331A1 (en) | Call authentication at the call center using a mobile device | |
US10148816B2 (en) | Interactive voice response (IVR) call authentication | |
JP2015099470A (ja) | 認証システム、方法、サーバ及びプログラム | |
CN112968892A (zh) | 信息的验证方法、装置、计算设备和介质 | |
WO2018099407A1 (zh) | 账户认证登录方法及装置 | |
JP2016149636A (ja) | 認証装置、電話端末、認証方法および認証プログラム | |
TWI462562B (zh) | 用於一語音通訊系統中交換資訊與控管的方法及相關裝置 | |
CN103916403A (zh) | 支持sip协议的免输入密码客户端的登录方法 | |
JP6115884B1 (ja) | サービス提供システム、認証装置、及びプログラム | |
JP6214781B2 (ja) | 接続システム及び接続方法 | |
EP3852330A1 (en) | Telephone call authentication | |
JP5495333B2 (ja) | 認証装置、認証システム、認証方法、およびプログラム | |
EP2755372A1 (en) | Validating communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17915324 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 3064797 Country of ref document: CA |
|
ENP | Entry into the national phase |
Ref document number: 2019566352 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20197035663 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017915324 Country of ref document: EP Effective date: 20191129 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |