WO2019047613A1 - 验证系统、方法和装置 - Google Patents

验证系统、方法和装置 Download PDF

Info

Publication number
WO2019047613A1
WO2019047613A1 PCT/CN2018/094976 CN2018094976W WO2019047613A1 WO 2019047613 A1 WO2019047613 A1 WO 2019047613A1 CN 2018094976 W CN2018094976 W CN 2018094976W WO 2019047613 A1 WO2019047613 A1 WO 2019047613A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
verification code
verification
server
acquisition request
Prior art date
Application number
PCT/CN2018/094976
Other languages
English (en)
French (fr)
Inventor
王洋
鲁凌
Original Assignee
北京京东尚科信息技术有限公司
北京京东世纪贸易有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京京东尚科信息技术有限公司, 北京京东世纪贸易有限公司 filed Critical 北京京东尚科信息技术有限公司
Publication of WO2019047613A1 publication Critical patent/WO2019047613A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Definitions

  • the present application relates to the field of computer technology, and in particular to the field of Internet technologies, and in particular, to a verification system, method and apparatus.
  • verification usually refers to the verification of network operations through various channels or means. For example, verification can effectively reduce malicious registration, login, swipe coupons, billing, etc., thereby ensuring the security of the user or merchant property.
  • the existing verification system does not analyze the information of the user who performs the network operation, and the verification code received by all the users is difficult to identify, and the targeted verification mechanism is lacking.
  • the purpose of the present application is to propose an improved verification system, method and apparatus to solve the technical problems mentioned in the background section above.
  • the embodiment of the present application provides a verification system, where the system includes an authentication server, a wind control server, and a service server.
  • the verification server is configured to receive a target verification code acquisition request sent by the target terminal device, and send the
  • the wind control server is configured to determine a target security level corresponding to the target verification code acquisition request, and send the target security level to the verification server, and the verification server is further configured to obtain the target verification code information corresponding to the target security level, and send the information to the target verification code.
  • the service server is configured to receive the verification code from the target terminal device, and send the verification code to the verification server; and the verification server is further configured to verify The code is matched with the target verification code corresponding to the target verification code information, and the first matching result is obtained and sent to the service server.
  • the service server is further configured to determine whether the verification is passed according to the first matching result.
  • the air control server is configured to: obtain current traffic of the service server; compare the current traffic with the first preset threshold to obtain a first comparison result; and obtain a security level corresponding to the first comparison result. As a target security level, different first comparison results correspond to different security levels.
  • the target verification code acquisition request includes a target user identifier; and the air control server is configured to: match the target user identifier in the pre-stored reference user identifier set to obtain a second matching result; The security level corresponding to the two matching results is used as the target security level, wherein different second matching results correspond to different security levels.
  • the target verification code acquisition request includes a target service identifier
  • the air control server is configured to: obtain a verification code acquisition request set in the first preset time period, where the verification code acquisition request includes a service identifier; Extracting the service identifier set from the verification code acquisition request set in the first preset time period; matching the target service identifier with each service identifier in the service identifier set to obtain the number of successful matches; The second preset threshold is compared to obtain a second comparison result; the security level corresponding to the second comparison result is obtained as the target security level, wherein the different second comparison results correspond to different security levels.
  • the target verification code acquisition request includes a target internet protocol IP address
  • the air control server is configured to: obtain a verification code acquisition request set in the second preset time period, where the verification code acquisition request includes the IP And obtaining a verification code acquisition request including the target IP address from the verification code acquisition request set in the second preset time period, generating a verification code acquisition request set to be determined; determining whether the verification code acquisition request set is to be determined to meet the preset The condition is obtained, and the determined result is obtained; the security level corresponding to the determined result is obtained as the target security level, wherein different determination results correspond to different security levels.
  • the verification code acquisition request includes a user identifier
  • the wind control server stores a reference user identification set in advance
  • the preset condition includes at least one of the following: the verification verification number corresponding to the verification code acquisition request set is not less than the first
  • the preset threshold is determined.
  • the verification success rate of the verification code acquisition request set is not less than the fourth preset threshold.
  • the ratio of the number of reference user identifiers in the verification code acquisition request set to the number of all user identifiers is not less than
  • a ratio of the number of times of verification corresponding to the reference user identifier in the verification code acquisition request set to the number of verification times corresponding to all the user identifiers is not less than a sixth preset threshold.
  • the service server is further configured to: receive a target verification request sent by the target terminal device, and send a target session creation request to the verification server; and the verification server is further configured to: create a target session, and obtain information of the target session.
  • the service server is further configured to: send the information of the target session to the target terminal device, so that the target terminal device sends the target verification code acquisition request to the verification server through the target session.
  • an embodiment of the present application provides a verification method for an authentication server, where the method includes: receiving a target verification code acquisition request sent by a target terminal device, and sending the request to a wind control server, so that the air control server determines the target.
  • the target security level corresponding to the verification code acquisition request obtaining the target security level from the wind control server, obtaining the target verification code information corresponding to the target security level, and transmitting the target verification code information to the target terminal device, so that the target terminal device according to the target verification code information Prompting to send a verification code to the service server; obtaining a verification code from the service server, and matching the verification code with the target verification code corresponding to the target verification code information to obtain a first matching result; sending the first matching result to the service server, The service server is caused to determine whether the verification is passed according to the first matching result.
  • the target security level is obtained by the wind control server by: obtaining the current traffic of the service server; comparing the current traffic with the first preset threshold to obtain a first comparison result; obtaining the first comparison result
  • the corresponding security level is used as the target security level, wherein different first comparison results correspond to different security levels.
  • the target verification code acquisition request includes the target user identifier; and the target security level is obtained by the wind control server by: matching the target user identifier in the pre-stored reference user identifier set to obtain a matching result; The security level corresponding to the matching result is obtained as the target security level, wherein different matching results correspond to different security levels.
  • the target verification code acquisition request includes the target service identifier; and the target security level is obtained by the wind control server by acquiring the verification code acquisition request set in the first preset time period, where the verification code is obtained.
  • the request includes the service identifier; the service identifier set is extracted from the verification code acquisition request set in the first preset time period; the target service identifier is matched with each service identifier in the service identifier set to obtain the number of successful matches; The number of successes is compared with the second preset threshold to obtain a second comparison result; the security level corresponding to the second comparison result is obtained as the target security level, wherein the different second comparison results correspond to different security levels.
  • the target verification code acquisition request includes a target internet protocol IP address; and the target security level is obtained by the wind control server by acquiring a verification code acquisition request set in the second preset time period, where the verification The code acquisition request includes an IP address; the verification code acquisition request including the target IP address is extracted from the verification code acquisition request set in the second preset time period, and the verification code acquisition request set to be determined is generated; and the verification code acquisition request is determined. Whether the set meets the preset condition and obtains the determined result; and obtains the security level corresponding to the determined result as the target security level, wherein different determination results correspond to different security levels.
  • the verification code acquisition request includes a user identifier
  • the wind control server stores a reference user identification set in advance
  • the preset condition includes at least one of the following: the verification verification number corresponding to the verification code acquisition request set is not less than the first
  • the preset threshold is determined.
  • the verification success rate of the verification code acquisition request set is not less than the fourth preset threshold.
  • the ratio of the number of reference user identifiers in the verification code acquisition request set to the number of all user identifiers is not less than
  • a ratio of the number of times of verification corresponding to the reference user identifier in the verification code acquisition request set to the number of verification times corresponding to all the user identifiers is not less than a sixth preset threshold.
  • the embodiment of the present application provides a verification apparatus for an authentication server, where the apparatus includes: a receiving unit configured to receive a target verification code acquisition request sent by a target terminal device, and send the request to the air control server to The obtaining, by the air control server, the target security level corresponding to the target verification code acquisition request, the acquiring unit, configured to obtain the target security level from the wind control server, obtain the target verification code information corresponding to the target security level, and send the information to the target terminal device. So that the target terminal device sends a verification code to the service server according to the prompt of the target verification code information; the matching unit is configured to obtain the verification code from the service server, and match the verification code with the target verification code corresponding to the target verification code information. And obtaining, by the sending unit, the sending unit, configured to send the first matching result to the service server, so that the service server determines, according to the first matching result, whether the verification is passed.
  • the target security level is obtained by the wind control server by: obtaining the current traffic of the service server; comparing the current traffic with the first preset threshold to obtain a first comparison result; obtaining the first comparison result
  • the corresponding security level is used as the target security level, wherein different first comparison results correspond to different security levels.
  • the target verification code acquisition request includes the target user identifier; and the target security level is obtained by the wind control server by: matching the target user identifier in the pre-stored reference user identifier set to obtain a matching result; The security level corresponding to the matching result is obtained as the target security level, wherein different matching results correspond to different security levels.
  • the target verification code acquisition request includes the target service identifier; and the target security level is obtained by the wind control server by acquiring the verification code acquisition request set in the first preset time period, where the verification code is obtained.
  • the request includes the service identifier; the service identifier set is extracted from the verification code acquisition request set in the first preset time period; the target service identifier is matched with each service identifier in the service identifier set to obtain the number of successful matches; The number of successes is compared with the second preset threshold to obtain a second comparison result; the security level corresponding to the second comparison result is obtained as the target security level, wherein the different second comparison results correspond to different security levels.
  • the target verification code acquisition request includes a target internet protocol IP address; and the target security level is obtained by the wind control server by acquiring a verification code acquisition request set in the second preset time period, where the verification The code acquisition request includes an IP address; the verification code acquisition request including the target IP address is extracted from the verification code acquisition request set in the second preset time period, and the verification code acquisition request set to be determined is generated; and the verification code acquisition request is determined. Whether the set meets the preset condition and obtains the determined result; and obtains the security level corresponding to the determined result as the target security level, wherein different determination results correspond to different security levels.
  • the verification code acquisition request includes a user identifier
  • the wind control server stores a reference user identification set in advance
  • the preset condition includes at least one of the following: the verification verification number corresponding to the verification code acquisition request set is not less than the first
  • the preset threshold is determined.
  • the verification success rate of the verification code acquisition request set is not less than the fourth preset threshold.
  • the ratio of the number of reference user identifiers in the verification code acquisition request set to the number of all user identifiers is not less than
  • a ratio of the number of times of verification corresponding to the reference user identifier in the verification code acquisition request set to the number of verification times corresponding to all the user identifiers is not less than a sixth preset threshold.
  • an embodiment of the present application provides a server, where the server includes: one or more processors; a storage device for storing one or more programs; and one or more programs when one or more programs are used by one or more processors Executing, causing one or more processors to implement the method as described in any one of the second aspects.
  • the embodiment of the present application provides a computer readable storage medium, where the computer program is stored, and when the computer program is executed by the processor, the method described in any one of the second aspects is implemented.
  • the verification server receives the target verification code acquisition request sent by the target terminal device, and sends the target verification code acquisition request to the wind control server; the wind control server determines the target security level corresponding to the target verification code acquisition request, And sending to the verification server; the verification server obtains the target verification code information corresponding to the target security level, and sends the information to the target terminal device, so that the target terminal device sends the verification code to the service server according to the prompt of the target verification code information; the service server from the target The terminal device receives the verification code and sends it to the verification server; the verification server matches the verification code with the target verification code corresponding to the target verification code information, obtains the first matching result, and sends the result to the service server; the service server according to the first matching result Determine if the verification passed.
  • the target verification code acquisition request is analyzed by the wind control server, thereby determining the target security level corresponding to the target verification code acquisition request, and obtaining the target verification code information corresponding to the target security level by the verification server, thereby realizing the targeted Verify the ground.
  • FIG. 1 is an exemplary system architecture diagram of a verification system in accordance with the present application.
  • FIG. 2 is a timing diagram of one embodiment of a verification system in accordance with the present application.
  • FIG. 3 is a flow chart of one embodiment of a verification method for an authentication server in accordance with the present application.
  • FIG. 4 is a schematic structural diagram of one embodiment of a verification apparatus for an authentication server according to the present application.
  • FIG. 5 is a schematic structural diagram of a computer system suitable for implementing a server of an embodiment of the present application.
  • FIG. 1 illustrates an exemplary system architecture 100 of a verification system in accordance with an embodiment of the present application.
  • system architecture 100 can include terminal devices 101, 102, 103, authentication server 104, service server 105, wind control server 106, and networks 107, 108.
  • the network 107 is used to provide a medium for communication links between the terminal devices 101, 102, 103, the authentication server 104, and the service server 105.
  • Network 108 is used to provide a medium for the communication link between authentication server 104 and wind control server 106.
  • the networks 107, 108 may include various types of connections, such as wired, wireless communication links, fiber optic cables, and the like.
  • the user can interact with the authentication server 104 via the network 107 using the terminal devices 101, 102, 103 to receive or transmit messages and the like.
  • Various communication client applications such as a web browser application, a shopping application, an instant communication tool, a mailbox client, a social platform software, and the like, may be installed on the terminal devices 101, 102, and 103.
  • the terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting verification code information browsing, including but not limited to smart phones, tablets, smart wearable devices (eg smart watches), laptop portable computers And desktop computers and more.
  • the verification server 104 can provide various services.
  • the verification server 104 can receive the target verification code acquisition request from the terminal device 101, 102, 103 via the network 107, and send the target verification code acquisition request to the weather control server 106 via the network 108;
  • the verification server 105 can also The wind control server 106 receives the target security level, acquires the target verification code information corresponding to the target security level, and transmits the information to the terminal devices 101, 102, and 103 through the network 107;
  • the verification server 104 can also receive the verification code from the service server 105 through the network 107. And matching the received verification code with the verification code corresponding to the target verification code information to obtain a first matching result, and sending the result to the service server 105 through the network 107.
  • the service server 105 may be a background server of the service requested by the terminal devices 101, 102, 103.
  • the service server 105 can present different interfaces to the terminal devices 101, 102, 103 based on different first matching results received from the authentication server 104 over the network 107.
  • the wind control server 106 can interact with the authentication server 104 over the network 108 to send or receive messages and the like.
  • the weather control server 106 can receive the target verification code acquisition request from the verification server 104 using the network 108, analyze the target verification code acquisition request, and the like, and feed back the processing result (eg, the target security level) to the verification through the network 108.
  • Server 104 can interact with the authentication server 104 over the network 108 to send or receive messages and the like.
  • the weather control server 106 can receive the target verification code acquisition request from the verification server 104 using the network 108, analyze the target verification code acquisition request, and the like, and feed back the processing result (eg, the target security level) to the verification through the network 108.
  • Server 104 can interact with the authentication server 104 over the network 108 to send or receive messages and the like.
  • the weather control server 106 can receive the target verification code acquisition request from the verification server 104 using the network 108, analyze the target verification code acquisition request, and the like, and feed back the
  • the verification method for the verification server provided by the embodiment of the present application is generally performed by the verification server 104. Accordingly, the verification apparatus for the verification server is generally disposed in the verification server 104.
  • terminal devices authentication servers, service servers, wind control servers, and networks in FIG. 1 is merely illustrative. Depending on the implementation needs, there can be any number of terminal devices, authentication servers, service servers, wind control servers, and networks.
  • FIG. 2 a sequence 200 of one embodiment of a verification system in accordance with the present application is illustrated.
  • the verification system in this embodiment may include an authentication server (such as the verification server 104 shown in FIG. 1), a weather control server (such as the weather control server 106 shown in FIG. 1), and a service server (such as the service server shown in FIG. 1).
  • the verification server is configured to receive a target verification code acquisition request sent by the target terminal device, and send the request to the wind control server, where the air control server is configured to determine a target security level corresponding to the target verification code acquisition request, and send the target security level.
  • the verification server is further configured to obtain the target verification code information corresponding to the target security level, and send the information to the target terminal device, so that the target terminal device sends the verification code to the service server according to the prompt of the target verification code information; And receiving the verification code from the target terminal device, and sending the verification code to the verification server; the verification server is further configured to match the verification code with the target verification code corresponding to the target verification code information, obtain the first matching result, and send the result to the service.
  • step 201 the verification server receives the target verification code acquisition request sent by the target terminal device.
  • the verification server (for example, the verification server 104 shown in FIG. 1) can receive the target verification from the target terminal device (for example, the terminal devices 101, 102, and 103 shown in FIG. 1) by a wired connection or a wireless connection.
  • Code acquisition request may include, but is not limited to, a target user identifier, a target service identifier, a target IP (Internet Protocol) address, and the like.
  • the target user identifier may be a user identifier of the currently logged-in user of the target terminal device that sends the target verification code acquisition request, and is usually composed of numbers, letters, symbols, and the like, for uniquely identifying the user.
  • the target user identifier may be the target user account.
  • the target service identifier may be a service identifier of the current request service of the target terminal device, and is usually composed of numbers, letters, symbols, and the like, and is used to uniquely identify the service.
  • the target IP address may be an IP address of the target terminal device and may be used to uniquely identify the terminal device.
  • the target terminal device may send the target verification code acquisition request to the verification server through the target session. Specifically, it can be achieved by the following steps:
  • the service server receives the target verification request sent by the target terminal device, and sends a target session creation request to the verification server.
  • the service server when the target terminal device requests a service from a service server (for example, the service server 105 shown in FIG. 1), the service server usually includes an authentication button on the interface displayed on the target terminal device.
  • the target terminal device When the target user clicks the verification button, the target terminal device sends a target verification request to the service server.
  • the business server receives the target authentication request, it sends a target session creation request to the authentication server.
  • the authentication server creates a target session and sends the information of the target session to the business server.
  • the service server then sends the information of the target session to the target terminal device.
  • the target terminal device sends a target verification code acquisition request to the verification server through the target session.
  • the target terminal device transmits a target verification code acquisition request to the verification server through the target session indicated by the information of the target session.
  • step 202 the verification server sends a target verification code acquisition request to the wind control server.
  • the verification server may transmit the target verification code acquisition request to the weather control server (the weather control server 106 shown in FIG. 1).
  • step 203 the wind control server determines a target security level corresponding to the target verification code acquisition request.
  • the wind control server may determine the target security level corresponding to the target verification code acquisition request.
  • the wind control server may determine the target security level by the following steps:
  • the current traffic of the service server may be the current traffic of the service server.
  • the current traffic is compared with the first preset threshold to obtain a first comparison result.
  • the first comparison result may include that the current traffic is greater than the first preset threshold and the current traffic is not greater than the first preset threshold.
  • different first comparison results may correspond to different security levels. As an example, if the current traffic is greater than the first preset threshold, the first comparison result corresponds to a higher security level; if the current traffic is not greater than the first preset threshold, the first comparison result corresponds to a lower security level.
  • the air control server may determine the target security level by the following steps:
  • the target user identifier is matched in the pre-stored reference user identifier set to obtain a second matching result.
  • the air control server may compare the target user identifier with each reference user identifier in the reference user identifier set one by one. If one reference user identifier is the same as the target user identifier, the matching is successful, and vice versa, the matching is unsuccessful.
  • the reference user identifier in the reference user identifier set may be based on analyzing a large amount of user behavior data, thereby obtaining abnormal user behavior data (for example, using the coupon multiple times in one day, and multiple times in the same store within one week) User ID of the user who has single, commented on the same store multiple times in a week, etc.).
  • the security level corresponding to the second matching result is obtained as the target security level.
  • the different second matching results may correspond to different security levels. As an example, if the target user identifier is successfully matched in the reference user identifier set, the second matching result corresponds to a higher security level; if the target user identifier is unsuccessful in the reference user identifier set, the second matching result is correspondingly lower. Security level.
  • the air control server may determine the target security level by the following steps:
  • a verification code acquisition request set in a first preset time period is obtained.
  • the verification code acquisition request may include a service identifier.
  • the wind control server can obtain a set of verification code acquisition requests within the previous hour.
  • the service identifier set is extracted from the verification code acquisition request set in the first preset time period.
  • the target service identifier is matched with each service identifier in the service identifier set to obtain the number of successful matches.
  • the number of times the matching succeeds may indicate the number of times the target service indicated by the target service identifier is requested within the first preset time period.
  • the number of successful matches is compared with a second preset threshold to obtain a second comparison result.
  • the second comparison result may include that the number of times the matching succeeds is greater than the second preset threshold and the number of successful matches is not greater than the second preset threshold.
  • the different second comparison results may correspond to different security levels. As an example, if the number of successful matches is greater than the second preset threshold, the second comparison result corresponds to a higher security level; if the number of successful matches is not greater than the second preset threshold, the second comparison result corresponds to a lower security. grade.
  • the air control server may determine the target security level by the following steps:
  • the verification code acquisition request may include an IP address.
  • the wind control server can obtain a set of verification code acquisition requests within the previous hour.
  • the verification code acquisition request including the target IP address is extracted from the verification code acquisition request set in the second preset time period, and the verification code acquisition request set to be determined is generated.
  • determining the result may include satisfying the preset condition and not satisfying the preset condition.
  • the preset condition may include but is not limited to at least one of the following:
  • the number of verifications corresponding to the verification code acquisition request set to be determined is not less than a third preset threshold.
  • the number of to-be-determined verification acquisition requests in the verification code acquisition request set to be determined is the number of verification times corresponding to the verification code acquisition request set to be determined.
  • the verification success rate corresponding to the verification code acquisition request set is not less than a fourth preset threshold.
  • the verification success rate corresponding to the verification code acquisition request set is determined as the ratio of the number of verification successes in the verification code acquisition request set to the number of to-be-determined verification acquisition requests in the to-be-determined verification code acquisition request set.
  • the ratio of the number of reference user identifiers in the verification code acquisition request set to the number of all user identifiers is not less than a fifth preset threshold.
  • the verification code acquisition request may include a user identifier, and the wind control server may store a reference user identifier set in advance.
  • the ratio of the number of times of verification corresponding to the reference user identifier in the verification code acquisition request set to the number of verification times corresponding to all user identifiers is not less than a sixth preset threshold.
  • the verification code acquisition request may include a user identifier, and the wind control server may store a reference user identifier set in advance.
  • the security level corresponding to the determination result is obtained as the target security level.
  • different determination results can correspond to different security levels. As an example, if the verification code acquisition request set is to be determined to meet the preset condition, the determination result corresponds to a higher security level; if the verification code acquisition request set is to be determined not to satisfy the preset condition, the determination result corresponds to a lower security level.
  • step 204 the weather control server sends the target security level to the verification server.
  • the air control server may send the target security level to the verification server.
  • step 205 the verification server obtains the target verification code information corresponding to the target security level.
  • the verification server may obtain the target verification code information corresponding to the target security level.
  • the verification server may pre-store a large amount of verification code information, where different security levels correspond to verification code information of different recognition difficulty.
  • the higher the security level the higher the difficulty of identifying the corresponding verification code information; the lower the security level, the lower the difficulty of identifying the corresponding verification code information.
  • the verification code information may include, but is not limited to, a Gif (Graphics Interchange Format) animation verification code, a mobile phone short message verification code, a mobile phone voice verification code, a video verification code, and the like.
  • the verification server may also periodically update the level of the verification code picture.
  • the verification server can update the level of the captcha picture every hour.
  • step 206 the verification server transmits the target verification code information to the target terminal device.
  • the verification server may send the target verification code information to the target terminal device, so that the target terminal device sends the verification code to the service server according to the prompt of the target verification code information.
  • step 207 the service server receives the verification code from the target terminal device.
  • the service server may receive the verification code from the target terminal device.
  • step 208 the service server sends a verification code to the verification server.
  • the service server may send the verification code to the verification server.
  • step 209 the verification server matches the verification code with the target verification code corresponding to the target verification code information to obtain a first matching result.
  • the verification code server may compare the verification code with the target verification code corresponding to the target verification code information. If the verification code is the same as the target verification code, the matching is successful. If the verification code is different from the target verification code, Then the match is not successful.
  • step 210 the verification server sends the first matching result to the service server.
  • the verification server may send the first matching result to the service server.
  • step 211 the service server determines whether the verification is passed according to the first matching result.
  • the service server may determine whether the verification is passed according to the first matching result.
  • the service server may determine that the verification passes, and then send the verification pass result to the target terminal device, so that the verification pass result is presented on the target terminal device; if the matching is unsuccessful, the service server may determine the verification. If not, the verification failure result is sent to the target terminal device, so that the verification failure result is presented on the target terminal device.
  • the interface of the service requested by the user may be presented on the target terminal device; if the verification fails, the interface for re-authentication may be presented on the target terminal device.
  • the verification server receives the target verification code acquisition request sent by the target terminal device, and sends the target verification code acquisition request to the wind control server; the wind control server determines the target security level corresponding to the target verification code acquisition request, and sends the verification to the verification target level.
  • a server the verification server obtains the target verification code information corresponding to the target security level, and sends the information to the target terminal device, so that the target terminal device sends the verification code to the service server according to the prompt of the target verification code information; the service server receives the verification from the target terminal device.
  • the code is sent to the verification server; the verification server matches the verification code with the target verification code corresponding to the target verification code information, obtains the first matching result, and sends the result to the service server; the service server determines whether the verification is passed according to the first matching result. .
  • the target verification code acquisition request is analyzed by the wind control server, thereby determining the target security level corresponding to the target verification code acquisition request, and obtaining the target verification code information corresponding to the target security level by the verification server, thereby realizing the targeted Verify the ground.
  • the process 300 for verifying the verification method of the server includes the following steps:
  • Step 301 Receive a target verification code acquisition request sent by the target terminal device, and send the request to the air control server.
  • the verification server (for example, the verification server 104 shown in FIG. 1) can receive the target verification from the target terminal device (for example, the terminal devices 101, 102, and 103 shown in FIG. 1) by a wired connection or a wireless connection.
  • the code acquisition request sends the target verification code acquisition request to the wind control server (for example, the risk control server 106 shown in FIG. 1), so that the wind control server determines the target security level corresponding to the target verification code acquisition request.
  • the target security level may be obtained by the wind control server by acquiring the current traffic of the service server, and comparing the current traffic with the first preset threshold to obtain the first comparison.
  • the security level corresponding to the first comparison result is obtained as the target security level, wherein the different first comparison results correspond to different security levels.
  • the target verification code acquisition request may include the target user identifier; and the target security level may be obtained by the wind control server by: identifying the target user in the pre-stored reference user identifier. The matching is performed in the set to obtain a matching result; the security level corresponding to the matching result is obtained as the target security level, wherein different matching results correspond to different security levels.
  • the target verification code acquisition request may include the target service identifier; and the target security level may be obtained by the wind control server by acquiring the verification code in the first preset time period.
  • the target verification code acquisition request may include a target internet protocol IP address; and the target security level may be obtained by the air control server by acquiring the second preset time period.
  • a verification code acquisition request set wherein the verification code acquisition request includes an IP address; extracting a verification code acquisition request including the target IP address from the verification code acquisition request set in the second preset time period, and generating a verification code acquisition request to be determined Determining whether the set of verification code acquisition requests to be determined satisfies a preset condition, and obtaining a determination result; obtaining a security level corresponding to the determination result as a target security level, wherein different determination results correspond to different security levels.
  • the verification code acquisition request may include a user identifier
  • the wind control server stores a reference user identifier set in advance
  • the preset condition may include, but is not limited to, at least one of the following: the verification to be determined The number of verifications corresponding to the code acquisition request set is not less than a third preset threshold; the verification success rate corresponding to the verification code acquisition request set is not less than a fourth preset threshold; the reference user identifier in the verification code acquisition request set to be determined The ratio of the number of the user IDs to the number of all the user identifiers is not less than the fifth preset threshold; and the ratio of the number of verifications corresponding to the reference user identifiers in the verification code acquisition request set to the number of verifications corresponding to all the user identifiers is not less than Six preset thresholds.
  • Step 302 Obtain a target security level from the wind control server, obtain target verification code information corresponding to the target security level, and send the information to the target terminal device.
  • the verification server may obtain the target security level from the wind control server, find the target verification code information corresponding to the target security level, and send the target verification code information to the target terminal device, so that the target terminal device according to the target
  • the prompt of the verification code information transmits a verification code to the service server (for example, the service server 105 shown in FIG. 1).
  • Step 303 Acquire a verification code from the service server, and match the verification code with the target verification code corresponding to the target verification code information to obtain a first matching result.
  • the verification server may obtain the verification code from the service server, and compare the verification code with the target verification code corresponding to the target verification code information. If the verification code is the same as the target verification code, the matching is successful, if the verification is successful. If the code is different from the target verification code, the match is unsuccessful.
  • Step 304 Send the first matching result to the service server.
  • the verification server may send the first matching result to the service server, so that the service server determines whether the verification is passed according to the first matching result.
  • the method for verifying the server provided by the embodiment of the present application firstly receives a target verification code acquisition request sent by the target terminal device, and sends the request to the air control server, so that the air control server determines the target corresponding to the target verification code acquisition request. After the security level is obtained, the target security level is obtained from the wind control server, and the target verification code information corresponding to the target security level is obtained and sent to the target terminal device, so that the target terminal device sends the verification to the service server according to the prompt of the target verification code information.
  • the server determines whether the verification passes according to the first matching result. Sending the target verification code acquisition request to the wind control server, so that the wind control server analyzes the target verification code acquisition request, thereby determining the target security level corresponding to the target verification code acquisition request, to obtain the target security level corresponding to the target security level.
  • Target verification code information which enables targeted verification.
  • the present application provides an embodiment of a verification apparatus for an authentication server, the apparatus embodiment corresponding to the method embodiment shown in FIG.
  • the device can be specifically applied to various electronic devices.
  • the verification apparatus 400 for the verification server shown in this embodiment may include: a receiving unit 401, an obtaining unit 402, a matching unit 403, and a transmitting unit 404.
  • the receiving unit 401 is configured to receive the target verification code acquisition request sent by the target terminal device, and send the request to the air control server, so that the air control server determines the target security level corresponding to the target verification code acquisition request; And configured to obtain the target security level from the wind control server, obtain the target verification code information corresponding to the target security level, and send the information to the target terminal device, so that the target terminal device sends the verification code to the service server according to the prompt of the target verification code information;
  • the matching unit 403 is configured to obtain a verification code from the service server, and match the verification code with the target verification code corresponding to the target verification code information to obtain a first matching result.
  • the sending unit 404 is configured to use the first matching result. Send to the service server, so that the service server determines whether the verification passes according to the first matching result.
  • step 301, step 302, step 303 and step 304 are not described herein again.
  • the target security level may be obtained by the wind control server by acquiring the current traffic of the service server, and comparing the current traffic with the first preset threshold to obtain the first comparison.
  • the security level corresponding to the first comparison result is obtained as the target security level, wherein the different first comparison results correspond to different security levels.
  • the target verification code acquisition request may include the target user identifier; and the target security level may be obtained by the wind control server by: identifying the target user in the pre-stored reference user identifier. The matching is performed in the set to obtain a matching result; the security level corresponding to the matching result is obtained as the target security level, wherein different matching results correspond to different security levels.
  • the target verification code acquisition request may include the target service identifier; and the target security level may be obtained by the wind control server by acquiring the verification code in the first preset time period.
  • the target verification code acquisition request may include a target internet protocol IP address; and the target security level may be obtained by the air control server by acquiring the second preset time period.
  • a verification code acquisition request set wherein the verification code acquisition request includes an IP address; extracting a verification code acquisition request including the target IP address from the verification code acquisition request set in the second preset time period, and generating a verification code acquisition request to be determined Determining whether the set of verification code acquisition requests to be determined satisfies a preset condition, and obtaining a determination result; obtaining a security level corresponding to the determination result as a target security level, wherein different determination results correspond to different security levels.
  • the verification code acquisition request may include a user identifier
  • the wind control server stores a reference user identifier set in advance
  • the preset condition may include, but is not limited to, at least one of the following: the verification to be determined The number of verifications corresponding to the code acquisition request set is not less than a third preset threshold; the verification success rate corresponding to the verification code acquisition request set is not less than a fourth preset threshold; the reference user identifier in the verification code acquisition request set to be determined The ratio of the number of the user IDs to the number of all the user identifiers is not less than the fifth preset threshold; and the ratio of the number of verifications corresponding to the reference user identifiers in the verification code acquisition request set to the number of verifications corresponding to all the user identifiers is not less than Six preset thresholds.
  • FIG. 5 there is shown a block diagram of a computer system 500 suitable for use in implementing the server of the embodiments of the present application.
  • the server shown in FIG. 5 is merely an example, and should not impose any limitation on the function and scope of use of the embodiments of the present application.
  • computer system 500 includes a central processing unit (CPU) 501 that can be loaded into a program in random access memory (RAM) 503 according to a program stored in read only memory (ROM) 502 or from storage portion 508. And perform various appropriate actions and processes.
  • RAM random access memory
  • ROM read only memory
  • RAM 503 various programs and data required for the operation of the system 500 are also stored.
  • the CPU 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504.
  • An input/output (I/O) interface 505 is also coupled to bus 504.
  • the following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, etc.; an output portion 507 including, for example, a cathode ray tube (CRT), a liquid crystal display (LCD), and the like, and a storage portion 508 including a hard disk or the like. And a communication portion 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the Internet.
  • Driver 510 is also coupled to I/O interface 505 as needed.
  • a removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory or the like is mounted on the drive 510 as needed so that a computer program read therefrom is installed into the storage portion 508 as needed.
  • an embodiment of the present disclosure includes a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for executing the method illustrated in the flowchart.
  • the computer program can be downloaded and installed from the network via the communication portion 509, and/or installed from the removable medium 511.
  • CPU central processing unit
  • the computer readable medium described above may be a computer readable signal medium or a computer readable storage medium or any combination of the two.
  • the computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the above. More specific examples of computer readable storage media may include, but are not limited to, electrical connections having one or more wires, portable computer disks, hard disks, random access memory (RAM), read only memory (ROM), erasable Programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
  • a computer readable storage medium may be any tangible medium that can contain or store a program, which can be used by or in connection with an instruction execution system, apparatus or device.
  • a computer readable signal medium may include a data signal that is propagated in the baseband or as part of a carrier, carrying computer readable program code. Such propagated data signals can take a variety of forms including, but not limited to, electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • the computer readable signal medium can also be any computer readable medium other than a computer readable storage medium, which can transmit, propagate, or transport a program for use by or in connection with the instruction execution system, apparatus, or device.
  • Program code embodied on a computer readable medium can be transmitted by any suitable medium, including but not limited to wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
  • each block of the flowchart or block diagram can represent a module, a program segment, or a portion of code that includes one or more of the logic functions for implementing the specified.
  • Executable instructions can also occur in a different order than that illustrated in the drawings. For example, two successively represented blocks may in fact be executed substantially in parallel, and they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowcharts, and combinations of blocks in the block diagrams and/or flowcharts can be implemented in a dedicated hardware-based system that performs the specified function or operation. Or it can be implemented by a combination of dedicated hardware and computer instructions.
  • the units involved in the embodiments of the present application may be implemented by software or by hardware.
  • the described unit may also be provided in the processor, for example, as a processor including a receiving unit, an obtaining unit, a matching unit, and a transmitting unit.
  • the name of these units does not constitute a limitation on the unit itself in some cases.
  • the receiving unit may also be described as “receiving a target verification code acquisition request sent by the target terminal device and transmitting it to the wind control server. unit”.
  • the present application further provides a computer readable medium, which may be included in a server described in the above embodiments; or may exist separately and not installed in the server.
  • the computer readable medium carries one or more programs, when the one or more programs are executed by the server, causing the server to: receive a target verification code acquisition request sent by the target terminal device, and send the request to the wind control server to The wind control server determines the target security level corresponding to the target verification code acquisition request; obtains the target security level from the wind control server, obtains the target verification code information corresponding to the target security level, and sends the target verification code information to the target terminal device, so that the target terminal device Sending a verification code to the service server according to the prompt of the target verification code information; obtaining the verification code from the service server, and matching the verification code with the target verification code corresponding to the target verification code information to obtain a first matching result; Send to the service server, so that the service server determines whether the verification passes according to the first matching result.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请实施例公开了验证系统、方法和装置。该系统的一具体实施方式包括:验证服务器接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器;风控服务器确定目标验证码获取请求所对应的目标安全等级,并发送至验证服务器;验证服务器获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;业务服务器接收验证码,并发送至验证服务器;验证服务器将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果,并发送至业务服务器;业务服务器根据第一匹配结果确定验证是否通过。该实施方式实现了富于针对性地进行验证。

Description

验证系统、方法和装置
相关申请的交叉引用
本专利申请要求于2017年9月5日提交的、申请号为201710792522.3、申请人为北京京东尚科信息技术有限公司和北京京东世纪贸易有限公司、发明名称为“验证系统、方法和装置”的中国专利申请的优先权,该申请的全文以引用的方式并入本申请中。
技术领域
本申请涉及计算机技术领域,具体涉及互联网技术领域,尤其涉及验证系统、方法和装置。
背景技术
在互联网领域,验证通常是指通过各种不同渠道或者手段对网络操作进行验证。例如,验证可以有效减少恶意注册、登录、刷优惠券、刷单等行为,进而保证用户或商家的财产安全。
然而,现有的验证系统并不对进行网络操作的用户的信息进行分析,所有的用户接收到的验证码识别难度相当,缺乏针对性的验证机制。
发明内容
本申请的目的在于提出一种改进的验证系统、方法和装置,来解决以上背景技术部分提到的技术问题。
第一方面,本申请实施例提供了一种验证系统,该系统包括验证服务器、风控服务器、业务服务器;其中,验证服务器,用于接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器;风控服务器,用于确定目标验证码获取请求所对应的目标安全等级,并发送至验证服务器;验证服务器,还用于获取目标安全等级所对应的目 标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;业务服务器,用于从目标终端设备接收验证码,并发送至验证服务器;验证服务器,还用于将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果,并发送至业务服务器;业务服务器,还用于根据第一匹配结果确定验证是否通过。
在一些实施例中,风控服务器,具体用于:获取业务服务器的当前流量;将当前流量与第一预设阈值进行比较,得到第一比较结果;获取与第一比较结果相对应的安全等级作为目标安全等级,其中,不同的第一比较结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标用户标识;以及风控服务器,具体用于:将目标用户标识在预先存储的参考用户标识集合中进行匹配,得到第二匹配结果;获取与第二匹配结果相对应的安全等级作为目标安全等级,其中,不同的第二匹配结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标业务标识;以及风控服务器,具体用于:获取第一预设时间段内的验证码获取请求集合,其中,验证码获取请求包括业务标识;从第一预设时间段内的验证码获取请求集合中提取业务标识集合;将目标业务标识与业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数;将匹配成功的次数与第二预设阈值进行比较,得到第二比较结果;获取与第二比较结果相对应的安全等级作为目标安全等级,其中,不同的第二比较结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标互联网协议IP地址;以及风控服务器,具体用于:获取第二预设时间段内的验证码获取请求集合,其中,验证码获取请求包括IP地址;从第二预设时间段内的验证码获取请求集合中提取出包括目标IP地址的验证码获取请求,生成待确定验证码获取请求集合;确定待确定验证码获取请求集合是否满足预设条件,并得到确定结果;获取与确定结果相对应的安全等级作为目标安全等级,其中,不同的确定结果对应不同的安全等 级。
在一些实施例中,验证码获取请求包括用户标识,风控服务器预先存储有参考用户标识集合;以及预设条件包括以下至少一项:待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值;待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值;待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值;以及待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。
在一些实施例中,业务服务器,还用于:接收目标终端设备发送的目标验证请求,并向验证服务器发送目标会话创建请求;验证服务器,还用于:创建目标会话,并将目标会话的信息发送至业务服务器;业务服务器,还用于:将目标会话的信息发送至目标终端设备,以使目标终端设备通过目标会话向验证服务器发送目标验证码获取请求。
第二方面,本申请实施例提供了一种用于验证服务器的验证方法,该方法包括:接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使风控服务器确定目标验证码获取请求所对应的目标安全等级;从风控服务器获取目标安全等级,获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;从业务服务器获取验证码,并将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;将第一匹配结果发送至业务服务器,以使业务服务器根据第一匹配结果确定验证是否通过。
在一些实施例中,目标安全等级是风控服务器通过如下步骤得到的:获取业务服务器的当前流量;将当前流量与第一预设阈值进行比较,得到第一比较结果;获取与第一比较结果相对应的安全等级作为目标安全等级,其中,不同的第一比较结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标用户标识;以及目标安全等级是风控服务器通过如下步骤得到的:将目标用户标识在预先存储的参考用户标识集合中进行匹配,得到匹配结果;获取与匹 配结果相对应的安全等级作为目标安全等级,其中,不同的匹配结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标业务标识;以及目标安全等级是风控服务器通过如下步骤得到的:获取第一预设时间段内的验证码获取请求集合,其中,验证码获取请求包括业务标识;从第一预设时间段内的验证码获取请求集合中提取业务标识集合;将目标业务标识与业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数;将匹配成功的次数与第二预设阈值进行比较,得到第二比较结果;获取与第二比较结果相对应的安全等级作为目标安全等级,其中,不同的第二比较结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标互联网协议IP地址;以及目标安全等级是风控服务器通过如下步骤得到的:获取第二预设时间段内的验证码获取请求集合,其中,验证码获取请求包括IP地址;从第二预设时间段内的验证码获取请求集合中提取出包括目标IP地址的验证码获取请求,生成待确定验证码获取请求集合;确定待确定验证码获取请求集合是否满足预设条件,并得到确定结果;获取与确定结果相对应的安全等级作为目标安全等级,其中,不同的确定结果对应不同的安全等级。
在一些实施例中,验证码获取请求包括用户标识,风控服务器预先存储有参考用户标识集合;以及预设条件包括以下至少一项:待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值;待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值;待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值;以及待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。
第三方面,本申请实施例提供了一种用于验证服务器的验证装置,该装置包括:接收单元,配置用于接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使风控服务器确定目标验证码获取请求所对应的目标安全等级;获取单元,配置用于从风控服务器 获取目标安全等级,获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;匹配单元,配置用于从业务服务器获取验证码,并将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;发送单元,配置用于将第一匹配结果发送至业务服务器,以使业务服务器根据第一匹配结果确定验证是否通过。
在一些实施例中,目标安全等级是风控服务器通过如下步骤得到的:获取业务服务器的当前流量;将当前流量与第一预设阈值进行比较,得到第一比较结果;获取与第一比较结果相对应的安全等级作为目标安全等级,其中,不同的第一比较结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标用户标识;以及目标安全等级是风控服务器通过如下步骤得到的:将目标用户标识在预先存储的参考用户标识集合中进行匹配,得到匹配结果;获取与匹配结果相对应的安全等级作为目标安全等级,其中,不同的匹配结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标业务标识;以及目标安全等级是风控服务器通过如下步骤得到的:获取第一预设时间段内的验证码获取请求集合,其中,验证码获取请求包括业务标识;从第一预设时间段内的验证码获取请求集合中提取业务标识集合;将目标业务标识与业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数;将匹配成功的次数与第二预设阈值进行比较,得到第二比较结果;获取与第二比较结果相对应的安全等级作为目标安全等级,其中,不同的第二比较结果对应不同的安全等级。
在一些实施例中,目标验证码获取请求包括目标互联网协议IP地址;以及目标安全等级是风控服务器通过如下步骤得到的:获取第二预设时间段内的验证码获取请求集合,其中,验证码获取请求包括IP地址;从第二预设时间段内的验证码获取请求集合中提取出包括目标IP地址的验证码获取请求,生成待确定验证码获取请求集合;确定待确定验证码获取请求集合是否满足预设条件,并得到确定结果;获取与确定结果相对应的安全等级作为目标安全等级,其中,不同的确定 结果对应不同的安全等级。
在一些实施例中,验证码获取请求包括用户标识,风控服务器预先存储有参考用户标识集合;以及预设条件包括以下至少一项:待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值;待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值;待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值;以及待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。
第四方面,本申请实施例提供了一种服务器,该服务器包括:一个或多个处理器;存储装置,用于存储一个或多个程序;当一个或多个程序被一个或多个处理器执行,使得一个或多个处理器实现如第二方面中任一实现方式描述的方法。
第五方面,本申请实施例提供了一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如第二方面中任一实现方式描述的方法。
本申请实施例提供的验证系统、方法和装置,验证服务器接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器;风控服务器确定目标验证码获取请求所对应的目标安全等级,并发送至验证服务器;验证服务器获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;业务服务器从目标终端设备接收验证码,并发送至验证服务器;验证服务器将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果,并发送至业务服务器;业务服务器根据第一匹配结果确定验证是否通过。通过风控服务器对目标验证码获取请求进行分析,从而确定出目标验证码获取请求所对应的目标安全等级,通过验证服务器获取目标安全等级所对应的目标验证码信息,从而实现了富于针对性地进行验证。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1是根据本申请的验证系统的示例性系统架构图;
图2是根据本申请的验证系统的一个实施例的时序图;
图3是根据本申请的用于验证服务器的验证方法的一个实施例的流程图;
图4是根据本申请的用于验证服务器的验证装置的一个实施例的结构示意图;以及
图5是适于用来实现本申请实施例的服务器的计算机系统的结构示意图。
具体实施方式
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释相关发明,而非对该发明的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与有关发明相关的部分。
需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。
图1示出了根据本申请实施例的验证系统的示例性系统架构100。
如图1所示,系统架构100可以包括终端设备101、102、103,验证服务器104,业务服务器105,风控服务器106和网络107、108。网络107用以在终端设备101、102、103,验证服务器104和业务服务器105之间提供通信链路的介质。网络108用以在验证服务器104和风控服务器106之间提供通信链路的介质。网络107、108可以包括各种连接类型,例如有线、无线通信链路或者光纤电缆等等。
用户可以使用终端设备101、102、103通过网络107与验证服务器104交互,以接收或发送消息等。终端设备101、102、103上可以安装有各种通讯客户端应用,例如网页浏览器应用、购物类应用、即时通信工具、邮箱客户端、社交平台软件等。
终端设备101、102、103可以是具有显示屏并且支持验证码信息浏览的各种电子设备,包括但不限于智能手机、平板电脑、智能可穿戴式设备(例如智能手表)、膝上型便携计算机和台式计算机等等。
验证服务器104可以提供各种服务。例如,验证服务器104可以通过网络107从终端设备101、102、103接收目标验证码获取请求,并通过网络108将目标验证码获取请求发送至风控服务器106;验证服务器105还可以通过网络108从风控服务器106接收目标安全等级,获取目标安全等级所对应的目标验证码信息,并通过网络107发送至终端设备101、102、103;验证服务器104还可以通过网络107从业务服务器105接收验证码,将所接收到的验证码与目标验证码信息所对应的验证码进行匹配,得到第一匹配结果,并通过网络107发送至业务服务器105。
业务服务器105可以是终端设备101、102、103所请求业务的后台服务器。业务服务器105可以根据通过网络107从验证服务器104接收到的不同第一匹配结果,向终端设备101、102、103展示不同的界面。
风控服务器106可以通过网络108与验证服务器104交互,以发送或接收消息等。例如,风控服务器106可以用过网络108从验证服务器104接收目标验证码获取请求,并对目标验证码获取请求进行分析等处理,并将处理结果(例如目标安全等级)通过网络108反馈给验证服务器104。
需要说明的是,本申请实施例所提供的用于验证服务器的验证方法一般由验证服务器104执行,相应地,用于验证服务器的验证装置一般设置于验证服务器104中。
应该理解,图1中的终端设备、验证服务器、业务服务器、风控服务器和网络的数目仅仅是示意性的。根据实现需要,可以具有任意数目的终端设备、验证服务器、业务服务器、风控服务器和网络。
继续参考图2,其示出了根据本申请的验证系统的一个实施例的时序200。
本实施例中的验证系统可以包括验证服务器(例如图1所示的验 证服务器104)、风控服务器(例如图1所示的风控服务器106)、业务服务器(例如图1所示的业务服务器105);其中,验证服务器,用于接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器;风控服务器,用于确定目标验证码获取请求所对应的目标安全等级,并发送至验证服务器;验证服务器,还用于获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;业务服务器,用于从目标终端设备接收验证码,并发送至验证服务器;验证服务器,还用于将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果,并发送至业务服务器;业务服务器,还用于根据第一匹配结果确定验证是否通过。
如图2所示,在步骤201中,验证服务器接收目标终端设备发送的目标验证码获取请求。
在本实施例中,验证服务器(例如图1所示的验证服务器104)可以通过有线连接方式或者无线连接方式从目标终端设备(例如图1所示的终端设备101、102、103)接收目标验证码获取请求。其中,目标验证码获取请求可以包括但不限于目标用户标识、目标业务标识、目标IP(Internet Protocol,互联网协议)地址等等。目标用户标识可以是发送目标验证码获取请求的目标终端设备的当前登录用户的用户标识,通常由数字、字母、符号等组成,用于唯一标识用户,例如,目标用户标识可以是目标用户账号。目标业务标识可以是目标终端设备的当前请求业务的业务标识,通常由数字、字母、符号等组成,用于唯一标识业务。目标IP地址可以是目标终端设备的IP地址,可以用于唯一标识终端设备。
在本实施例的一些可选的实现方式中,目标终端设备可以通过目标会话向验证服务器发送目标验证码获取请求。具体地,可以通过以下步骤实现:
首先,业务服务器接收目标终端设备发送的目标验证请求,并向验证服务器发送目标会话创建请求。
这里,目标终端设备向业务服务器(例如图1所示的业务服务器 105)请求业务时,业务服务器在目标终端设备上展示的界面上通常会包括验证按钮。当目标用户点击验证按钮时,目标终端设备就向业务服务器发送目标验证请求。当业务服务器接收到目标验证请求时,就会向验证服务器发送目标会话创建请求。
之后,验证服务器创建目标会话,并将目标会话的信息发送至业务服务器。
然后,业务服务器将目标会话的信息发送至目标终端设备。
最后,目标终端设备通过目标会话向验证服务器发送目标验证码获取请求。
这里,目标终端设备通过目标会话的信息所指示的目标会话向验证服务器发送目标验证码获取请求。
在步骤202中,验证服务器将目标验证码获取请求发送至风控服务器。
在本实施例中,基于步骤201中所接收到的目标验证码获取请求,验证服务器可以将目标验证码获取请求发送至风控服务器(图1所示的风控服务器106)。
在步骤203中,风控服务器确定目标验证码获取请求所对应的目标安全等级。
在本实施例中,在接收到验证码服务器所发送的目标验证码获取请求之后,风控服务器可以确定目标验证码获取请求所对应的目标安全等级。
在本实施例的一些可选的实现方式中,风控服务器可以通过如下步骤确定目标安全等级:
首先,获取业务服务器的当前流量。
其中,业务服务器的当前流量可以是业务服务器的当前访问量。
然后,将当前流量与第一预设阈值进行比较,得到第一比较结果。
作为示例,第一比较结果可以包括当前流量大于第一预设阈值和当前流量不大于第一预设阈值。
最后,获取与第一比较结果相对应的安全等级作为目标安全等级。
其中,不同的第一比较结果可以对应不同的安全等级。作为示例, 若当前流量大于第一预设阈值,则第一比较结果对应较高的安全等级;若当前流量不大于第一预设阈值,则第一比较结果对应较低的安全等级。
在本实施例的一些可选的实现方式中,在目标验证码获取请求包括目标用户标识的情况下,风控服务器可以通过如下步骤确定目标安全等级:
首先,将目标用户标识在预先存储的参考用户标识集合中进行匹配,得到第二匹配结果。
这里,风控服务器可以将目标用户标识与参考用户标识集合中的每个参考用户标识进行逐一比对,若存在一个参考用户标识与目标用户标识相同,则匹配成功,反之,则匹配不成功。
其中,参考用户标识集合中的参考用户标识可以是根据对大量用户行为数据进行分析,从而获取的用户行为数据异常(例如,在一天内多次使用优惠券、在一周内在同一家商店多次下单、在一周内对同一家商店多次评论等等)的用户的用户标识。
然后,获取与第二匹配结果相对应的安全等级作为目标安全等级。
其中,不同的第二匹配结果可以对应不同的安全等级。作为示例,若目标用户标识在参考用户标识集合中匹配成功,则第二匹配结果对应较高的安全等级;若目标用户标识在参考用户标识集合中匹配不成功,则第二匹配结果对应较低的安全等级。
在本实施例的一些可选的实现方式中,在目标验证码获取请求包括目标业务标识的情况下,风控服务器可以通过如下步骤确定目标安全等级:
首先,获取第一预设时间段内的验证码获取请求集合。
其中,验证码获取请求可以包括业务标识。作为示例,风控服务器可以获取前一个小时内的验证码获取请求集合。
之后,从第一预设时间段内的验证码获取请求集合中提取业务标识集合。
而后,将目标业务标识与业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数。
其中,匹配成功的次数可以表示第一预设时间段内目标业务标识所指示的目标业务被请求的次数。
然后,将匹配成功的次数与第二预设阈值进行比较,得到第二比较结果。
作为示例,第二比较结果可以包括匹配成功的次数大于第二预设阈值和匹配成功的次数不大于第二预设阈值。
最后,获取与第二比较结果相对应的安全等级作为目标安全等级,
其中,不同的第二比较结果可以对应不同的安全等级。作为示例,若匹配成功的次数大于第二预设阈值,则第二比较结果对应较高的安全等级;若匹配成功的次数不大于第二预设阈值,则第二比较结果对应较低的安全等级。
在本实施例的一些可选的实现方式中,在目标验证码获取请求包括目标互联网协议IP地址的情况下,风控服务器可以通过如下步骤确定目标安全等级:
首先,获取第二预设时间段内的验证码获取请求集合。
其中,验证码获取请求可以包括IP地址。作为示例,风控服务器可以获取前一个小时内的验证码获取请求集合。
之后,从第二预设时间段内的验证码获取请求集合中提取出包括目标IP地址的验证码获取请求,生成待确定验证码获取请求集合。
然后,确定待确定验证码获取请求集合是否满足预设条件,并得到确定结果。
作为示例,确定结果可以包括满足预设条件和不满足预设条件。
可选的,预设条件可以包括但不限于以下至少一项:
1、待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值。其中,待确定验证码获取请求集合中的待确定验证获取请求的数量即待确定验证码获取请求集合所对应的验证次数。
2、待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值。其中,待确定验证码获取请求集合所对应的验证成功率即待确定验证码获取请求集合中验证成功的数量与待确定验证码获取请求集合中的待确定验证获取请求的数量的比值。
3、待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值。其中,验证码获取请求可以包括用户标识,风控服务器预先可以存储有参考用户标识集合。
4、待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。其中,验证码获取请求可以包括用户标识,风控服务器预先可以存储有参考用户标识集合。
最后,获取与确定结果相对应的安全等级作为目标安全等级。
其中,不同的确定结果可以对应不同的安全等级。作为示例,若待确定验证码获取请求集合满足预设条件,则确定结果对应较高的安全等级;若待确定验证码获取请求集合不满足预设条件,则确定结果对应较低的安全等级。
在步骤204中,风控服务器将目标安全等级发送至验证服务器。
在本实施例中,基于步骤203所确定出的目标安全等级,风控服务器可以将目标安全等级发送至验证服务器。
在步骤205中,验证服务器获取目标安全等级所对应的目标验证码信息。
在本实施例中,验证服务器可以获取目标安全等级所对应的目标验证码信息。其中,验证服务器中可以预先存储有大量的验证码信息,其中,不同的安全等级对应不同识别难度的验证码信息。作为示例,安全等级越高,其对应的验证码信息识别难度越高;安全等级越低,其对应的验证码信息识别难度越低。其中,验证码信息可以包括但不限于Gif(Graphics Interchange Format,图像互换格式)动画验证码、手机短信验证码、手机语音验证码、视频验证码等等。
在本实施例的一些可选的实现方式中,验证服务器还可以周期性地更新验证码图片的等级。作为示例,验证服务器可以每隔一小时更新一次验证码图片的等级。
在步骤206中,验证服务器将目标验证码信息发送至目标终端设备。
在本实施例中,基于步骤205所获取到的目标验证码信息,验证 服务器可以将目标验证码信息发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码。
在步骤207中,业务服务器从目标终端设备接收验证码。
在本实施例中,当目标用户在目标验证码信息的提示下输入验证码后,业务服务器可以从目标终端设备接收验证码。
在步骤208中,业务服务器将验证码发送至验证服务器。
在本实施例中,基于步骤207所接收到的验证码,业务服务器可以将验证码发送验证服务器。
在步骤209中,验证服务器将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果。
在本实施例中,验证码服务器可以将验证码与目标验证码信息所对应的目标验证码进行比对,若验证码与目标验证码相同,则匹配成功,若验证码与目标验证码不同,则匹配不成功。
在步骤210中,验证服务器将第一匹配结果发送至业务服务器。
在本实施例中,基于步骤209所得到的第一匹配结果,验证服务器可以将第一匹配结果发送至业务服务器。
在步骤211中,业务服务器根据第一匹配结果确定验证是否通过。
在本实施例中,业务服务器可以根据第一匹配结果确定验证是否通过。
通常,在匹配成功的情况下,业务服务器可以确定验证通过,进而向目标终端设备发送验证通过结果,以使目标终端设备上呈现验证通过结果;在匹配不成功的情况下,业务服务器可以确定验证不通过,进而向目标终端设备发送验证不通过结果,以使目标终端设备上呈现验证不通过结果。作为示例,在验证通过的情况下,目标终端设备上可以呈现用户所请求业务的界面;在验证不通过的情况下,目标终端设备上可以呈现重新进行验证的界面。
本申请实施例提供的验证系统,验证服务器接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器;风控服务器确定目标验证码获取请求所对应的目标安全等级,并发送至验证服务器;验证服务器获取目标安全等级所对应的目标验证码信息,并发送至目标 终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;业务服务器从目标终端设备接收验证码,并发送至验证服务器;验证服务器将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果,并发送至业务服务器;业务服务器根据第一匹配结果确定验证是否通过。通过风控服务器对目标验证码获取请求进行分析,从而确定出目标验证码获取请求所对应的目标安全等级,通过验证服务器获取目标安全等级所对应的目标验证码信息,从而实现了富于针对性地进行验证。
进一步参考图3,其示出了根据本申请的用于验证服务器的验证方法的一个实施例的流程300。该用于验证服务器的验证方法的流程300,包括以下步骤:
步骤301,接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器。
在本实施例中,验证服务器(例如图1所示的验证服务器104)可以通过有线连接方式或者无线连接方式从目标终端设备(例如图1所示的终端设备101、102、103)接收目标验证码获取请求,并将目标验证码获取请求发送至风控服务器(例如图1所示的风控服务器106),以使风控服务器确定目标验证码获取请求所对应的目标安全等级。
在本实施例的一些可选的实现方式中,目标安全等级可以是风控服务器通过如下步骤得到的:获取业务服务器的当前流量;将当前流量与第一预设阈值进行比较,得到第一比较结果;获取与第一比较结果相对应的安全等级作为目标安全等级,其中,不同的第一比较结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,目标验证码获取请求可以包括目标用户标识;以及目标安全等级可以是风控服务器通过如下步骤得到的:将目标用户标识在预先存储的参考用户标识集合中进行匹配,得到匹配结果;获取与匹配结果相对应的安全等级作为目标安全等级,其中,不同的匹配结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,目标验证码获取请求可以包括目标业务标识;以及目标安全等级可以是风控服务器通过如下步 骤得到的:获取第一预设时间段内的验证码获取请求集合,其中,验证码获取请求包括业务标识;从第一预设时间段内的验证码获取请求集合中提取业务标识集合;将目标业务标识与业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数;将匹配成功的次数与第二预设阈值进行比较,得到第二比较结果;获取与第二比较结果相对应的安全等级作为目标安全等级,其中,不同的第二比较结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,目标验证码获取请求可以包括目标互联网协议IP地址;以及目标安全等级可以是风控服务器通过如下步骤得到的:获取第二预设时间段内的验证码获取请求集合,其中,验证码获取请求包括IP地址;从第二预设时间段内的验证码获取请求集合中提取出包括目标IP地址的验证码获取请求,生成待确定验证码获取请求集合;确定待确定验证码获取请求集合是否满足预设条件,并得到确定结果;获取与确定结果相对应的安全等级作为目标安全等级,其中,不同的确定结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,验证码获取请求可以包括用户标识,风控服务器预先存储有参考用户标识集合;以及预设条件可以包括但不限于以下至少一项:待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值;待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值;待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值;以及待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。
步骤302,从风控服务器获取目标安全等级,获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备。
在本实施例中,验证服务器可以从风控服务器获取目标安全等级,查找出目标安全等级所对应的目标验证码信息,并将目标验证码信息发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器(例如图1所示的业务服务器105)发送验证码。
步骤303,从业务服务器获取验证码,并将验证码与目标验证码 信息所对应的目标验证码进行匹配,得到第一匹配结果。
在本实施例中,验证服务器可以从业务服务器获取验证码,并将验证码与目标验证码信息所对应的目标验证码进行比对,若验证码与目标验证码相同,则匹配成功,若验证码与目标验证码不同,则匹配不成功。
步骤304,将第一匹配结果发送至业务服务器。
在本实施例中,验证服务器可以将第一匹配结果发送至业务服务器,以使业务服务器根据第一匹配结果确定验证是否通过。
本申请实施例提供的用于验证服务器的验证方法,首先,接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使风控服务器确定目标验证码获取请求所对应的目标安全等级;之后,从风控服务器获取目标安全等级,获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;然后,从业务服务器获取验证码,并将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;最后,将第一匹配结果发送至业务服务器,以使业务服务器根据第一匹配结果确定验证是否通过。通过将目标验证码获取请求发送至风控服务器,以使风控服务器对目标验证码获取请求进行分析,从而确定出目标验证码获取请求所对应的目标安全等级,以获取目标安全等级所对应的目标验证码信息,从而实现了富于针对性地进行验证。
进一步参考图4,作为对上述图3所示方法的实现,本申请提供了一种用于验证服务器的验证装置的一个实施例,该装置实施例与图3所示的方法实施例相对应,该装置具体可以应用于各种电子设备中。
如图4所示,本实施例所示的用于验证服务器的验证装置400可以包括:接收单元401、获取单元402、匹配单元403和发送单元404。其中,接收单元401,配置用于接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使风控服务器确定目标验证码获取请求所对应的目标安全等级;获取单元402,配置用于从风控服务器获取目标安全等级,获取目标安全等级所对应的目标验证码信息, 并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;匹配单元403,配置用于从业务服务器获取验证码,并将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;发送单元404,配置用于将第一匹配结果发送至业务服务器,以使业务服务器根据第一匹配结果确定验证是否通过。
在本实施例中,用于验证服务器的验证装置400中:接收单元401、获取单元402、匹配单元403和发送单元404的具体处理及其所带来的技术效果可分别参考图3对应实施例中的步骤301、步骤302、步骤303和步骤304的相关说明,在此不再赘述。
在本实施例的一些可选的实现方式中,目标安全等级可以是风控服务器通过如下步骤得到的:获取业务服务器的当前流量;将当前流量与第一预设阈值进行比较,得到第一比较结果;获取与第一比较结果相对应的安全等级作为目标安全等级,其中,不同的第一比较结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,目标验证码获取请求可以包括目标用户标识;以及目标安全等级可以是风控服务器通过如下步骤得到的:将目标用户标识在预先存储的参考用户标识集合中进行匹配,得到匹配结果;获取与匹配结果相对应的安全等级作为目标安全等级,其中,不同的匹配结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,目标验证码获取请求可以包括目标业务标识;以及目标安全等级可以是风控服务器通过如下步骤得到的:获取第一预设时间段内的验证码获取请求集合,其中,验证码获取请求包括业务标识;从第一预设时间段内的验证码获取请求集合中提取业务标识集合;将目标业务标识与业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数;将匹配成功的次数与第二预设阈值进行比较,得到第二比较结果;获取与第二比较结果相对应的安全等级作为目标安全等级,其中,不同的第二比较结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,目标验证码获取请求可以 包括目标互联网协议IP地址;以及目标安全等级可以是风控服务器通过如下步骤得到的:获取第二预设时间段内的验证码获取请求集合,其中,验证码获取请求包括IP地址;从第二预设时间段内的验证码获取请求集合中提取出包括目标IP地址的验证码获取请求,生成待确定验证码获取请求集合;确定待确定验证码获取请求集合是否满足预设条件,并得到确定结果;获取与确定结果相对应的安全等级作为目标安全等级,其中,不同的确定结果对应不同的安全等级。
在本实施例的一些可选的实现方式中,验证码获取请求可以包括用户标识,风控服务器预先存储有参考用户标识集合;以及预设条件可以包括但不限于以下至少一项:待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值;待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值;待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值;以及待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。
下面参考图5,其示出了适于用来实现本申请实施例的服务器的计算机系统500的结构示意图。图5示出的服务器仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图5所示,计算机系统500包括中央处理单元(CPU)501,其可以根据存储在只读存储器(ROM)502中的程序或者从存储部分508加载到随机访问存储器(RAM)503中的程序而执行各种适当的动作和处理。在RAM 503中,还存储有系统500操作所需的各种程序和数据。CPU 501、ROM 502以及RAM 503通过总线504彼此相连。输入/输出(I/O)接口505也连接至总线504。
以下部件连接至I/O接口505:包括键盘、鼠标等的输入部分506;包括诸如阴极射线管(CRT)、液晶显示器(LCD)等以及扬声器等的输出部分507;包括硬盘等的存储部分508;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分509。通信部分509经由诸如因特网的网络执行通信处理。驱动器510也根据需要连接至I/O接口505。可拆卸介质511,诸如磁盘、光盘、磁光盘、半导体存储器等等, 根据需要安装在驱动器510上,以便于从其上读出的计算机程序根据需要被安装入存储部分508。
特别地,根据本公开的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本公开的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分509从网络上被下载和安装,和/或从可拆卸介质511被安装。在该计算机程序被中央处理单元(CPU)501执行时,执行本申请的方法中限定的上述功能。
需要说明的是,本申请上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本申请中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本申请中,计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:无线、电线、光缆、RF等等,或者上述的任意合适的组合。
附图中的流程图和框图,图示了按照本申请各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点 上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本申请实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元也可以设置在处理器中,例如,可以描述为:一种处理器包括接收单元、获取单元、匹配单元和发送单元。其中,这些单元的名称在某种情况下并不构成对该单元本身的限定,例如,接收单元还可以被描述为“接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器的单元”。
作为另一方面,本申请还提供了一种计算机可读介质,该计算机可读介质可以是上述实施例中描述的服务器中所包含的;也可以是单独存在,而未装配入该服务器中。上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该服务器执行时,使得该服务器:接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使风控服务器确定目标验证码获取请求所对应的目标安全等级;从风控服务器获取目标安全等级,获取目标安全等级所对应的目标验证码信息,并发送至目标终端设备,以使目标终端设备根据目标验证码信息的提示向业务服务器发送验证码;从业务服务器获取验证码,并将验证码与目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;将第一匹配结果发送至业务服务器,以使业务服务器根据第一匹配结果确定验证是否通过。
以上描述仅为本申请的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本申请中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述 发明构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本申请中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。

Claims (11)

  1. 一种验证系统,其特征在于,所述系统包括验证服务器、风控服务器、业务服务器;
    所述验证服务器,用于接收目标终端设备发送的目标验证码获取请求,并发送至所述风控服务器;
    所述风控服务器,用于确定所述目标验证码获取请求所对应的目标安全等级,并发送至所述验证服务器;
    所述验证服务器,还用于获取所述目标安全等级所对应的目标验证码信息,并发送至所述目标终端设备,以使所述目标终端设备根据所述目标验证码信息的提示向所述业务服务器发送验证码;
    所述业务服务器,用于从所述目标终端设备接收所述验证码,并发送至所述验证服务器;
    所述验证服务器,还用于将所述验证码与所述目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果,并发送至所述业务服务器;
    所述业务服务器,还用于根据所述第一匹配结果确定验证是否通过。
  2. 根据权利要求1所述的系统,其特征在于,所述风控服务器,具体用于:
    获取所述业务服务器的当前流量;
    将所述当前流量与第一预设阈值进行比较,得到第一比较结果;
    获取与所述第一比较结果相对应的安全等级作为所述目标安全等级,其中,不同的第一比较结果对应不同的安全等级。
  3. 根据权利要求1所述的系统,其特征在于,所述目标验证码获取请求包括目标用户标识;以及
    所述风控服务器,具体用于:
    将所述目标用户标识在预先存储的参考用户标识集合中进行匹配, 得到第二匹配结果;
    获取与所述第二匹配结果相对应的安全等级作为所述目标安全等级,其中,不同的第二匹配结果对应不同的安全等级。
  4. 根据权利要求1所述的系统,其特征在于,所述目标验证码获取请求包括目标业务标识;以及
    所述风控服务器,具体用于:
    获取第一预设时间段内的验证码获取请求集合,其中,验证码获取请求包括业务标识;
    从所述第一预设时间段内的验证码获取请求集合中提取业务标识集合;
    将所述目标业务标识与所述业务标识集合中的各个业务标识分别进行匹配,获取匹配成功的次数;
    将所述匹配成功的次数与第二预设阈值进行比较,得到第二比较结果;
    获取与所述第二比较结果相对应的安全等级作为所述目标安全等级,其中,不同的第二比较结果对应不同的安全等级。
  5. 根据权利要求1所述的系统,其特征在于,所述目标验证码获取请求包括目标互联网协议IP地址;以及
    所述风控服务器,具体用于:
    获取第二预设时间段内的验证码获取请求集合,其中,验证码获取请求包括IP地址;
    从所述第二预设时间段内的验证码获取请求集合中提取出包括所述目标IP地址的验证码获取请求,生成待确定验证码获取请求集合;
    确定所述待确定验证码获取请求集合是否满足预设条件,并得到确定结果;
    获取与所述确定结果相对应的安全等级作为目标安全等级,其中,不同的确定结果对应不同的安全等级。
  6. 根据权利要求5所述的系统,其特征在于,验证码获取请求包括用户标识,所述风控服务器预先存储有参考用户标识集合;以及
    所述预设条件包括以下至少一项:
    所述待确定验证码获取请求集合所对应的验证次数不小于第三预设阈值;
    所述待确定验证码获取请求集合所对应的验证成功率不小于第四预设阈值;
    所述待确定验证码获取请求集合中的参考用户标识的数量与所有用户标识的数量的比值不小于第五预设阈值;以及
    所述待确定验证码获取请求集合中的参考用户标识所对应的验证次数与所有用户标识所对应的验证次数的比值不小于第六预设阈值。
  7. 根据权利要求1所述的系统,其特征在于,
    所述业务服务器,还用于:
    接收所述目标终端设备发送的目标验证请求,并向所述验证服务器发送目标会话创建请求;
    所述验证服务器,还用于:
    创建目标会话,并将所述目标会话的信息发送至所述业务服务器;
    所述业务服务器,还用于:
    将所述目标会话的信息发送至所述目标终端设备,以使所述目标终端设备通过所述目标会话向所述验证服务器发送所述目标验证码获取请求。
  8. 一种用于验证服务器的验证方法,其特征在于,所述方法包括:
    接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使所述风控服务器确定所述目标验证码获取请求所对应的目标安全等级;
    从所述风控服务器获取所述目标安全等级,获取所述目标安全等级所对应的目标验证码信息,并发送至所述目标终端设备,以使所述目标终端设备根据所述目标验证码信息的提示向业务服务器发送验证 码;
    从所述业务服务器获取所述验证码,并将所述验证码与所述目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;
    将所述第一匹配结果发送至所述业务服务器,以使所述业务服务器根据所述第一匹配结果确定验证是否通过。
  9. 一种用于验证服务器的验证装置,其特征在于,所述装置包括:
    接收单元,配置用于接收目标终端设备发送的目标验证码获取请求,并发送至风控服务器,以使所述风控服务器确定所述目标验证码获取请求所对应的目标安全等级;
    获取单元,配置用于从所述风控服务器获取所述目标安全等级,获取所述目标安全等级所对应的目标验证码信息,并发送至所述目标终端设备,以使所述目标终端设备根据所述目标验证码信息的提示向业务服务器发送验证码;
    匹配单元,配置用于从所述业务服务器获取所述验证码,并将所述验证码与所述目标验证码信息所对应的目标验证码进行匹配,得到第一匹配结果;
    发送单元,配置用于将所述第一匹配结果发送至所述业务服务器,以使所述业务服务器根据所述第一匹配结果确定验证是否通过。
  10. 一种服务器,其特征在于,所述服务器包括:
    一个或多个处理器;
    存储装置,用于存储一个或多个程序;
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求8中所述的方法。
  11. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求8中所述的方法。
PCT/CN2018/094976 2017-09-05 2018-07-09 验证系统、方法和装置 WO2019047613A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710792522.3 2017-09-05
CN201710792522.3A CN107395647A (zh) 2017-09-05 2017-09-05 验证系统、方法和装置

Publications (1)

Publication Number Publication Date
WO2019047613A1 true WO2019047613A1 (zh) 2019-03-14

Family

ID=60351248

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/094976 WO2019047613A1 (zh) 2017-09-05 2018-07-09 验证系统、方法和装置

Country Status (2)

Country Link
CN (1) CN107395647A (zh)
WO (1) WO2019047613A1 (zh)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395647A (zh) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 验证系统、方法和装置
CN110062019B (zh) * 2018-01-19 2021-11-19 中国移动通信有限公司研究院 一种风险控制方法及终端设备
CN108400897B (zh) * 2018-05-04 2020-01-14 新华三大数据技术有限公司 网络安全配置方法及装置
CN108449186B (zh) * 2018-06-11 2020-06-05 京东数字科技控股有限公司 安全验证方法和装置
CN109033800A (zh) * 2018-07-20 2018-12-18 北京云测信息技术有限公司 一种验证信息的提取方法及装置
CN109547622B (zh) * 2018-09-20 2021-06-29 维沃移动通信有限公司 一种验证方法及终端设备
CN109618349B (zh) * 2019-01-08 2022-08-12 中国联合网络通信集团有限公司 一种数据传输方法和服务器
CN110427745B (zh) * 2019-07-02 2022-03-08 五八有限公司 验证码获取方法、装置、电子设备和计算机可读介质
CN111667274A (zh) * 2020-06-16 2020-09-15 中国银行股份有限公司 一种认证方法及相关设备
CN111918224B (zh) * 2020-07-28 2022-03-04 广州市百果园信息技术有限公司 短信验证方法、装置、设备及存储介质
CN112948812B (zh) * 2021-03-29 2022-07-08 天津车之家数据信息技术有限公司 一种验证码的分配方法、计算设备及存储介质
CN113489729B (zh) * 2021-07-09 2023-08-29 福州数据技术研究院有限公司 一种基于预置视频的网页验证生成方法和系统
CN113468515A (zh) * 2021-07-13 2021-10-01 富途网络科技(深圳)有限公司 用户身份验证方法、装置、电子设备以及存储介质
CN114006758B (zh) * 2021-10-29 2024-01-09 北京达佳互联信息技术有限公司 一种设备标识的管理方法、装置及存储介质
CN114172714A (zh) * 2021-12-02 2022-03-11 北京金山云网络技术有限公司 账号访问权限的控制方法、装置和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255913A (zh) * 2011-07-14 2011-11-23 北京百度网讯科技有限公司 一种用于基于验证安全等级提供语音验证码的方法与设备
CN102957682A (zh) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 一种用于基于验证安全等级提供图片验证码的方法与设备
CN105046141A (zh) * 2015-06-12 2015-11-11 北京京东尚科信息技术有限公司 一种自适应的验证码设计方法及系统
CN107395647A (zh) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 验证系统、方法和装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100280955A1 (en) * 2009-04-30 2010-11-04 General Electric Company Systems and methods for verifying identity
CN103488922B (zh) * 2013-08-27 2017-06-23 百度在线网络技术(北京)有限公司 一种用于提供验证码的方法与设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102255913A (zh) * 2011-07-14 2011-11-23 北京百度网讯科技有限公司 一种用于基于验证安全等级提供语音验证码的方法与设备
CN102957682A (zh) * 2011-08-30 2013-03-06 北京百度网讯科技有限公司 一种用于基于验证安全等级提供图片验证码的方法与设备
CN105046141A (zh) * 2015-06-12 2015-11-11 北京京东尚科信息技术有限公司 一种自适应的验证码设计方法及系统
CN107395647A (zh) * 2017-09-05 2017-11-24 北京京东尚科信息技术有限公司 验证系统、方法和装置

Also Published As

Publication number Publication date
CN107395647A (zh) 2017-11-24

Similar Documents

Publication Publication Date Title
WO2019047613A1 (zh) 验证系统、方法和装置
CN110365491B (zh) 业务处理方法、装置、设备、存储介质以及数据共享系统
US10818291B2 (en) Method and apparatus for interacting information
JP2020537229A (ja) ロイヤルティ・ポイント配布のためのシステム及び方法
US10395246B2 (en) System and method for verifying identity information using a social networking application
WO2019200965A1 (zh) 用于连接无线接入点的方法和设备
CN107249004B (zh) 一种身份认证方法、装置及客户端
US20160014104A1 (en) Device-Pairing by Reading an Address Provided in Device-Readable Form
WO2021203919A1 (zh) 用于评估联合训练模型的方法和装置
WO2019200966A1 (zh) 用于分享信息、获取信息的方法和设备
US9270666B2 (en) Verification of user communication addresses
US20220029983A1 (en) System and method for automated customer verification
WO2020078050A1 (zh) 评论信息处理方法和装置、服务器、终端及可读介质
CN112883435A (zh) 一种实现与智能合约安全通信的方法和设备
CN111199037A (zh) 登录方法、系统和装置
CN111865761B (zh) 一种基于区块链智能合约的社交聊天信息存证方法
CN109348298B (zh) 信息推送、播放多媒体数据流的方法和设备
CN112598810A (zh) 一种展会入场处理方法和装置
US20240177200A1 (en) Business service interaction method and apparatus, device, and storage medium
CN108141434B (zh) 经由设备通知提供多因素认证凭证
CN114417318A (zh) 第三方页面的跳转方法、装置和电子设备
CN109543398B (zh) 一种应用程序账户迁移方法、装置和电子设备
CN111897620A (zh) 交互方法、装置和电子设备
CN112104733B (zh) 用于获取预设业务信息的方法、装置、电子设备和介质
KR20210131327A (ko) 에어 사인 심볼들을 사용하는 모션-가능 트랜잭션 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18853806

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18853806

Country of ref document: EP

Kind code of ref document: A1