WO2020206906A1 - Procédé et appareil de traitement d'informations d'enregistrement, dispositif informatique et support de stockage - Google Patents

Procédé et appareil de traitement d'informations d'enregistrement, dispositif informatique et support de stockage Download PDF

Info

Publication number
WO2020206906A1
WO2020206906A1 PCT/CN2019/102575 CN2019102575W WO2020206906A1 WO 2020206906 A1 WO2020206906 A1 WO 2020206906A1 CN 2019102575 W CN2019102575 W CN 2019102575W WO 2020206906 A1 WO2020206906 A1 WO 2020206906A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal
user
verification information
application
Prior art date
Application number
PCT/CN2019/102575
Other languages
English (en)
Chinese (zh)
Inventor
郭荣
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020206906A1 publication Critical patent/WO2020206906A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Definitions

  • This application relates to a registration information processing method, device, computer equipment and storage medium.
  • a registration information processing method, apparatus, computer equipment, and storage medium are provided.
  • a registration information processing method executed by a computer device, the method comprising: receiving a registration request sent by a terminal; the registration request carries user information; randomly generating first verification information according to the registration request, and generating a first verification information based on the first verification information 2.
  • Verification information sending the first verification information and the second verification information to the terminal; receiving the first voice information corresponding to the first verification information and the second verification information returned by the terminal Corresponding second voice information; extract the first voiceprint feature corresponding to the first voice information, and the second voiceprint feature corresponding to the second voice information; calculate the first voiceprint feature and the second voiceprint feature Voiceprint errors between voiceprint features; determine the user type according to the user information, obtain the error range corresponding to the user type, and determine whether the voiceprint error is within the error range; and if it is within the error range, Complete account registration based on the user information, obtain preset virtual resources, and transfer the virtual resources to the account.
  • the registration request sent by the receiving terminal includes: monitoring the application review record generated by the target website displayed by the user browsing terminal; detecting whether the application review record contains user identification information; The user is marked as a target user; the application review record is analyzed to obtain the application requirement information of each target user; the target program link corresponding to each target user is generated according to the application requirement information; the target program link is pushed according to the user identification information To the terminal corresponding to the corresponding target user; and receiving the registration request sent by the terminal based on the target program link.
  • the randomly generating the first verification information according to the registration request includes: obtaining the device verification information corresponding to the terminal according to the registration request; performing a hash operation on the device verification information to obtain the current hash; Identify whether the same device hash exists in the historical registration data; and if not, randomly generate the first verification information.
  • the randomly generating the first verification information according to the registration request and generating the second verification information based on the first verification information includes: sending the randomly generated first verification information to the terminal according to the registration request; Receive the first voice information corresponding to the first verification information returned by the terminal; extract the first voiceprint feature corresponding to the first voice information; identify whether there is a similarity to the first voiceprint feature in the historical registration data User's voiceprint feature whose degree exceeds the threshold; and if not, generating second verification information based on the first verification information.
  • the extracting the first voiceprint feature corresponding to the first voice information includes: parsing the first voice information to obtain a corresponding acoustic wave signal; framing the acoustic wave signal to obtain A plurality of single-frame acoustic wave signals; Fourier transform is performed on each single-frame acoustic wave signal to obtain a corresponding frequency spectrum. Extracting a single-frame voiceprint feature from the frequency spectrum; and generating a first voiceprint feature corresponding to the first voice information according to the single-frame voiceprint feature of each frame.
  • the method further includes: receiving an assistance request sent by a terminal; the assistance request carries an application program identifier; and sending the assistance request to the terminal according to the assistance request Return to the authorization application page; monitor the selection of multiple assistance options of the terminal on the authorization application page; and when the selected assistance option is a synchronous observation option, call the assistance component to the user’s page based on the application During the operation, screen recording is performed, and the recording information is synchronized to the assisting terminal corresponding to the application identifier, so that the assisting terminal performs abnormal location based on the recording information.
  • a registration information processing device comprising: a registration request module for receiving a registration request sent by a terminal; the registration request carries user information; a registration verification module for randomly generating first verification information based on the registration request; The first verification information generates second verification information; sending the first verification information and the second verification information to the terminal; receiving the first voice information corresponding to the first verification information returned by the terminal, and Second voice information corresponding to the second verification information; extract the first voiceprint feature corresponding to the first voice information, and the second voiceprint feature corresponding to the second voice information; calculate the first voice The voiceprint error between the fingerprint feature and the second voiceprint feature; determine the user type according to the user information, obtain the error range corresponding to the user type, and determine whether the voiceprint error is within the error range; And a resource transfer module, configured to complete account registration based on the user information, obtain a preset virtual resource, and transfer the virtual resource to the account if it is within the error range.
  • the registration request module is also used to monitor the application review record generated by the target website displayed by the user browsing terminal; detect whether the application review record contains user identification information; if so, mark the user For the target user; analyze the application review records to obtain the application demand information of each target user; generate the target program link corresponding to each target user according to the application demand information; push the target program link to the corresponding target according to the user identification information A terminal corresponding to the user; and receiving a registration request sent by the terminal based on the target program link.
  • a computer device includes a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the steps of the registration information processing method provided in any embodiment of the present application are implemented.
  • One or more non-volatile computer-readable storage media storing computer-readable instructions.
  • the one or more processors implement any one of the embodiments of the present application. Provide the steps of the registration information processing method.
  • Fig. 1 is an application scenario diagram of the registration information processing method according to one or more embodiments.
  • Fig. 2 is a schematic flowchart of a method for processing registration information according to one or more embodiments.
  • Fig. 3 is a schematic flowchart of steps of generating first verification information according to one or more embodiments.
  • Fig. 4 is a schematic flowchart of the steps of generating verification information according to one or more embodiments.
  • Fig. 5 is a structural block diagram of a registration information processing device according to one or more embodiments.
  • Figure 6 is a block diagram of a computer device according to one or more embodiments.
  • the registration information processing method provided in this application can be applied to the application environment shown in FIG. 1.
  • the terminal 102 and the server 104 communicate through the network.
  • the terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
  • the server 104 may be implemented by an independent server or a server cluster composed of multiple servers.
  • the terminal 102 can send a registration request to the server 104.
  • the registration request carries user information, such as gender and age.
  • the server 104 randomly generates the first verification information according to the registration request, and sends the first verification information to the terminal 102.
  • the user enters the first voice information corresponding to the first verification information through the terminal 102, and the terminal 102 sends the first voice information to the server 104.
  • the server 104 extracts the first voiceprint feature corresponding to the first voice information, and recognizes whether there is a baseline voiceprint feature whose similarity to the first voiceprint feature exceeds a threshold in the historical registration data.
  • the server 104 If it does not exist, the server 104 generates second verification information based on the first verification information, and sends the second verification information to the terminal 102.
  • the user enters the second voice information corresponding to the second verification information through the terminal 102, and the terminal 102 sends the second voice information to the server 104.
  • the server 104 extracts the second voiceprint feature corresponding to the second voice information, and calculates the voiceprint error between the first voiceprint feature and the second voiceprint feature.
  • the server 104 pre-stores error intervals corresponding to multiple user types.
  • the server 104 determines the user type of the registered user according to the user information, obtains the error interval corresponding to the user type, and determines whether the voiceprint error is within the error interval.
  • the server 104 obtains the corresponding virtual resource and transfers the virtual resource to the account 102.
  • malicious registration situations such as multiple registrations of the same person or bots pretending to register can be accurately identified, thereby improving the effectiveness of application information push and saving interactive resources.
  • a method for processing registration information is provided. Taking the method applied to the server in FIG. 1 as an example for description, the method includes the following steps:
  • Step 202 Receive a registration request sent by the terminal; the registration request carries user information.
  • Step 204 randomly generating first verification information according to the registration request, and generating second verification information based on the first verification information; sending the first verification information and the second verification information to the terminal.
  • the first verification information may be randomly generated text information, such as a string formed by splicing multiple characters.
  • the characters can be at least one of numbers, Chinese characters, or letters.
  • the first verification information may also be a randomly generated reading audio containing text information, such as a reading audio of one or more words and sentences.
  • the sentence to be read can be collected from a variety of data sources.
  • the first verification information may also be a randomly generated reading video containing text information. It is easy to understand that if the first verification information is a reading audio or a reading video, the first verification information also includes tone information of the text information.
  • the second verification information includes other text information that is different from the first verification information.
  • the second verification information may also be randomly generated text information, reading audio or reading video. In order to improve the recognition rate of malicious registration, there is a big difference between the second verification information and the first verification information for the registered user's reading tone requirements.
  • Step 206 Receive the first voice information corresponding to the first verification information and the second voice information corresponding to the second verification information returned by the terminal.
  • Step 208 Extract the first voiceprint feature corresponding to the first voice information and the second voiceprint feature corresponding to the second voice information; calculate the voiceprint error between the first voiceprint feature and the second voiceprint feature.
  • extracting the first voiceprint feature corresponding to the first voice information includes: parsing the first voice information to obtain the corresponding acoustic wave signal; framing the acoustic wave signal to obtain multiple single-frame acoustic wave signals; Each single-frame sound wave signal is Fourier transformed to obtain the corresponding frequency spectrum. Extract the single-frame voiceprint feature from the frequency spectrum; generate the first voiceprint feature corresponding to the first voice information according to the single-frame voiceprint feature of each frame.
  • the sound wave signal is information about the frequency and amplitude of the sound wave.
  • the sound wave signal specifically uses the frequency of the sound as the ordinate and time as the abscissa, reflecting the information that the frequency of the sound changes with time. Framing is to set consecutive time points as one frame. Framing the sound wave signal may specifically be to divide the sound wave signal into a number of sound wave signals whose abscissa interval is the frame length according to a preset frame length.
  • the Fourier transform is a way to convert a time domain function into a frequency domain function.
  • the frequency spectrum is information about the frequency distribution of sound.
  • the frequency spectrum specifically takes the frequency of the sound as the abscissa, and the amplitude and phase of the frequency components as the ordinate, which represents the distribution of the amplitude of each frequency sine wave at a static time point.
  • the Fourier transform is performed on the sound wave signal of each frame to obtain the corresponding frequency spectrum. Specifically, the corresponding trigonometric function of the sound wave signal of each frame is converted into the frequency spectrum within each frame time.
  • Step 210 Determine the user type according to the user information, obtain the error range corresponding to the user type, and determine whether the voiceprint error is within the error range.
  • the voiceprint error is used to describe the matching degree of the voiceprint features contained in the voice information entered twice before and after the registered user.
  • the server calculates the voiceprint error by superimposing the frequency spectrum of the first voiceprint feature and the frequency spectrum of the second voiceprint feature. For example, the frequency spectrum of the first voiceprint feature and the frequency spectrum of the second voiceprint feature can be overlapped and displayed, the single-frame difference of the corresponding amplitude and phase at each same sound frequency can be identified, and the preset logic of multiple single-frame differences can be performed Operation, the operation result is recorded as the voiceprint error between the first voiceprint feature and the second voiceprint feature.
  • the preset logic operation can be summation or overlap addition based on preset weights.
  • the voiceprint error can also be calculated in other ways, and there is no restriction on this.
  • User information includes age, gender, etc.
  • the server can determine the user type of the registered user.
  • the server pre-stores the error range of voiceprint features corresponding to multiple user types.
  • the server obtains the error range corresponding to the user type of the currently registered user, and determines whether the voiceprint error is within the obtained error range.
  • Step 212 If within the error range, complete account registration based on user information, obtain preset virtual resources, and transfer the virtual resources to the account.
  • the server can re-send the randomly generated verification information to the terminal in the above-mentioned manner, that is, give the user a chance to register again.
  • the server can permanently or temporarily cancel the registration authority of the corresponding terminal.
  • the server completes the account registration based on the user information, obtains the preset virtual resources, and transfers the virtual resources to the account. Comparing the voiceprint error of different voice information input multiple times with the error range, compared with the traditional registration verification method, it can provide the registration verification accuracy rate.
  • the first verification character can be randomly generated according to the registration request sent by the terminal; the second verification character can be generated based on the first verification character; the first verification character and the second verification character are sent to the terminal, and the terminal return can be received
  • the first voice information corresponding to the first verification character and the second voice information corresponding to the second verification character can be extracted to obtain the first voiceprint feature corresponding to the first voice information and the second voice information corresponding to the second voice information.
  • Fingerprint characteristics according to the user information carried in the registration request, the user type can be determined; by calculating the voiceprint error between the first voiceprint feature and the second voiceprint feature, and obtaining the error range corresponding to the user type, the voiceprint error can be judged Whether it is within the error range; if it is within the error range, you can obtain the preset virtual resources and transfer the virtual resources to the account.
  • the user is authenticated by comparing the voiceprint error of different voice messages entered multiple times with the error range. Only through the authentication can the virtual resources be transferred to the registered user, which can increase the user registration threshold and reduce malicious registration to obtain rewards. Risks, thereby improving the effectiveness of application information push and saving interactive resources.
  • receiving the registration request sent by the terminal includes: monitoring the application review record generated by the target website displayed by the user browsing the terminal; detecting whether the application review record contains user identification information; if so, marking the user as the target user Analyze the application review records to obtain the application demand information of each target user; generate the target program link corresponding to each target user according to the application demand information; push the target program link to the terminal corresponding to the corresponding target user according to the user identification information; The registration request sent by the receiving terminal based on the target program link.
  • the target website can be an application download platform or a browser.
  • the application review record may be a user's search record for application-related information on the target website, or a consultation record for the application provider's customer service.
  • the server crawls the application review records of different users from the specified target website according to a preset time frequency.
  • the server parses the application review record and detects whether the application review record contains user identification information.
  • User identification information refers to information that can uniquely identify a user, such as mobile phone number, mailbox number, social account number, etc. In another embodiment, the user identification information may also be a terminal identification, such as a hardware identification code or an IP address. If the application review record contains user identification information, the corresponding user is marked as the target user.
  • Application demand information refers to information that can characterize which types of applications the user is interested in, or the application functions that the user expects to be able to achieve.
  • the server determines each target application that may be of interest to the target user according to the application requirement information, and pushes the target program link corresponding to the target application to the terminal corresponding to the target user based on the user identification information.
  • the target user can send a registration request to the server based on the target program link.
  • actively discovering target customers by crawling application review records can not only speed up the efficiency of target users in acquiring target applications, but also improve the pertinence of application information push, thereby improving the effectiveness of application information push.
  • randomly generating the first verification information according to the registration request, and the steps of generating the first verification information include:
  • Step 302 Obtain device verification information corresponding to the terminal according to the registration request.
  • the device verification information includes a variety of terminal identifications, such as IP addresses, hardware identification codes, etc.
  • Step 304 Perform a hash operation on the device verification information to obtain the current hash.
  • the multiple terminal identifiers are spliced in a preset format to obtain a spliced string, and the spliced string is hashed.
  • Step 306 Identify whether the same device hash exists in the historical registration data.
  • Step 308 if not, randomly generate first verification information.
  • the voiceprint features are used to verify the registered users, but also the registered device is verified, which can improve the accuracy of malicious registration identification; in addition, compared to the traditional method of restricting the number of IP address access registrations to prevent malicious registration, it will be more
  • the registration verification after the terminal identification is spliced can increase the cost of malicious registration and can further improve the accuracy of malicious registration identification.
  • the first verification information is randomly generated according to the registration request, and the second verification information is generated based on the first verification information, that is, the step of generating verification information includes:
  • Step 402 Send randomly generated first verification information to the terminal according to the registration request.
  • Step 404 Receive the first voice information corresponding to the first verification information returned by the terminal.
  • Step 406 Extract the first voiceprint feature corresponding to the first voice information.
  • Step 408 Identify whether there is a user's voiceprint feature whose similarity to the first voiceprint feature exceeds a threshold in the historical registration data.
  • Step 410 if not, generate second verification information based on the first verification information.
  • the historical registration data includes not only the voiceprint characteristics of users who have successfully registered, but also the voiceprint characteristics of users who have failed to register.
  • identify whether there is a user's voiceprint feature whose similarity to the first voiceprint feature exceeds a threshold in the historical registration data that is, identify whether someone has already registered based on the voiceprint feature. If it exists, it can already signify that the current registered user has the risk of "multiple registrations by the same person".
  • the server no longer generates the second verification information to continue verification at this time. Only when there is no user voiceprint feature whose similarity exceeds the threshold in the historical registration data, the server generates the second verification information based on the first verification information.
  • the second verification information is generated to reduce unnecessary verification process, improve registration verification efficiency, and save server resources.
  • the virtual resource after the virtual resource is transferred to the account, it further includes: receiving the assistance request sent by the terminal; the assistance request carries the application identifier; returning the authorization application page to the terminal according to the assistance request; monitoring the terminal in the authorization application page Selection operation of multiple assistance options; when the selected assistance option is a synchronous observation option, the assistance component is called to screen the user's application-based page operation process, and the recording information is synchronized to the assistance terminal corresponding to the application identifier. Enable the assisting terminal to locate abnormalities based on the recorded information.
  • the user uses the application program on the terminal (denoted as the "first terminal").
  • the application program can send a remote assistance request to the second terminal corresponding to one or more preset developers.
  • the user sends a remote assistance request to the server based on the application at the first terminal, and the server forwards the remote assistance request to the designated second terminal.
  • the server forwards the remote assistance request. After the server forwards the remote assistance request to the preset second terminal corresponding to one or more developers, it detects whether there is a second terminal responding to the remote assistance request within the preset time.
  • the preset time can be set freely according to actual needs, such as 10 minutes.
  • the server responds to the remote assistance request in time and sends a screen recording request to the first terminal.
  • the first terminal calls the first component to screen the user's application-based page operation process, and sends the recording information to the server for storage.
  • the subsequent developers can use the second The terminal reads the recorded information from the server, and then locates the abnormality, which avoids the cumbersome feedback of the abnormality by the user multiple times.
  • the remote assistance request carries the user's corresponding application account.
  • the second terminal sends a remote connection request to the first terminal according to the application account, and after the remote connection, the second terminal sends an authorization application page to the first terminal.
  • the authorization application page includes simultaneous observation options and remote control options.
  • the user can select options on the first terminal, and then authorize the developer to synchronously observe or remotely control the running status of the application on the first terminal.
  • the first terminal captures the user's selected operation on the authorization application page, and adopts a corresponding abnormal location strategy based on the selected information.
  • the first component is pre-integrated in the application.
  • the first component is used to perform screen recording of the user's application-based page operation process according to the user's selected operation on the synchronous observation option, and synchronously display the recorded information on the second terminal.
  • Establishing a connection between the second terminal and the first terminal allows developers to view the flow of the user's operation of the application in real time.
  • the recording information can be screenshots and stored during the viewing process for repeated viewing.
  • the second component is also pre-integrated in the application.
  • the second component is used to synchronously display the window where the application program is located on the second terminal according to the user's selected operation on the remote control option, so that the second terminal can remotely control the application program and then perform abnormal location. If the developer finds that the application is abnormal due to an error in the operation process, he can initiate an authorization application to the first terminal again, so as to be able to remotely control the first terminal, and then provide operation guidance to the user to improve the efficiency of troubleshooting.
  • the abnormality of the application can be displayed to the developer in real time, which saves the user from repeating the cumbersome description of the abnormality and improves the problem location of the developer.
  • the efficiency and accuracy of the application program thereby improving the effectiveness of application information promotion.
  • a registration information processing device including: a registration request module 502, a registration verification module 504, and a resource transfer module 506, wherein:
  • the registration request module 502 is used to receive a registration request sent by the terminal; the registration request carries user information.
  • the registration verification module 504 is configured to randomly generate first verification information according to the registration request, and generate second verification information based on the first verification information; send the first verification information and the second verification information to the terminal; The first voice information corresponding to the information, and the second voice information corresponding to the second verification information; extract the first voiceprint feature corresponding to the first voice information, and the second voiceprint feature corresponding to the second voice information; calculate the first The voiceprint error between the voiceprint feature and the second voiceprint feature; determine the user type according to the user information, obtain the error range corresponding to the user type, and determine whether the voiceprint error is within the error range.
  • the resource transfer module 506 is configured to complete account registration based on user information, obtain preset virtual resources, and transfer the virtual resources to the account if it is within the error range.
  • the registration request module 502 is also used to monitor the application review records generated by the target website displayed on the user browsing terminal; detect whether the application review records contain user identification information; if so, mark the user as the target user; The application review records are analyzed to obtain the application requirement information of each target user; the target program link corresponding to each target user is generated according to the application requirement information; the target program link is pushed to the terminal corresponding to the corresponding target user according to the user identification information; the receiving terminal A registration request sent based on the target program link.
  • the registration verification module 504 is further configured to obtain device verification information corresponding to the terminal according to the registration request; perform a hash operation on the device verification information to obtain the current hash; and identify whether the same device exists in the historical registration data. Greek; if not, the first verification information is randomly generated.
  • the registration verification module 504 is further configured to send randomly generated first verification information to the terminal according to the registration request; receive the first voice information corresponding to the first verification information returned by the terminal; and extract the first voice information corresponding to the The first voiceprint feature; identify whether there is a user's voiceprint feature whose similarity with the first voiceprint feature exceeds the threshold in the historical registration data; if not, generate second verification information based on the first verification information.
  • the registration verification module 504 is also used to parse the first voice information to obtain the corresponding acoustic wave signal; divide the acoustic wave signal into frames to obtain multiple single-frame acoustic wave signals; perform Fourier Fourier on each single-frame acoustic wave signal Transform to get the corresponding frequency spectrum. Extract the single-frame voiceprint feature from the frequency spectrum; generate the first voiceprint feature corresponding to the first voice information according to the single-frame voiceprint feature of each frame.
  • the device further includes an application assistance module 508 for receiving an assistance request sent by the terminal; the assistance request carries the application program identifier; the authorization application page is returned to the terminal according to the assistance request; the monitoring terminal is in the authorization application page Selection operation of multiple assistance options; when the selected assistance option is a synchronous observation option, the assistance component is called to screen the user's application-based page operation process, and the recording information is synchronized to the assistance terminal corresponding to the application identifier. Enable the assisting terminal to locate abnormalities based on the recorded information.
  • Each module in the above-mentioned registered information processing device may be implemented in whole or in part by software, hardware, and a combination thereof.
  • the foregoing modules may be embedded in the form of hardware or independent of the processor in the computer device, or may be stored in the memory of the computer device in the form of software, so that the processor can call and execute the operations corresponding to the foregoing modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 6.
  • the computer equipment includes a processor, a memory, a network interface and a database connected through a system bus.
  • the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, computer readable instructions and a database.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the database of the computer equipment is used to store historical verification data.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer-readable instruction is executed by the processor to realize a registration information processing method.
  • FIG. 6 is only a block diagram of part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
  • One or more non-volatile storage media storing computer-readable instructions.
  • the computer-readable instructions are executed by one or more processors, the one or more processors realize the registration provided in any embodiment of the present application Information processing method steps.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé de traitement d'informations d'enregistrement, comprenant les étapes consistant à : générer de manière aléatoire des premières informations de vérification selon une demande d'enregistrement envoyée par un terminal, et générer des secondes informations de vérification sur la base des premières informations de vérification ; envoyer les premières informations de vérification et les secondes informations de vérification au terminal ; recevoir des premières informations vocales correspondant aux premières informations de vérification et des secondes informations vocales correspondant aux secondes informations de vérification renvoyées par le terminal ; extraire une première caractéristique d'empreinte vocale correspondant aux premières informations vocales et une seconde caractéristique d'empreinte vocale correspondant aux secondes informations vocales ; calculer une erreur d'empreinte vocale entre la première caractéristique d'empreinte vocale et la seconde caractéristique d'empreinte vocale ; déterminer un type d'utilisateur en fonction d'informations d'utilisateur transportées dans la demande d'enregistrement, et déterminer si l'erreur d'empreinte vocale se situe dans une plage d'erreur correspondant au type d'utilisateur correspondant ; et si tel est le cas, achever l'enregistrement de compte sur la base des informations d'utilisateur, obtenir une ressource virtuelle prédéfinie, et transférer la ressource virtuelle à un compte.
PCT/CN2019/102575 2019-04-12 2019-08-26 Procédé et appareil de traitement d'informations d'enregistrement, dispositif informatique et support de stockage WO2020206906A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910295671.8 2019-04-12
CN201910295671.8A CN110099047B (zh) 2019-04-12 2019-04-12 注册信息处理方法、装置、计算机设备和存储介质

Publications (1)

Publication Number Publication Date
WO2020206906A1 true WO2020206906A1 (fr) 2020-10-15

Family

ID=67444829

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/102575 WO2020206906A1 (fr) 2019-04-12 2019-08-26 Procédé et appareil de traitement d'informations d'enregistrement, dispositif informatique et support de stockage

Country Status (2)

Country Link
CN (1) CN110099047B (fr)
WO (1) WO2020206906A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112818868A (zh) * 2021-02-03 2021-05-18 招联消费金融有限公司 基于行为序列特征数据的违规用户识别方法和装置
CN113259373A (zh) * 2021-06-08 2021-08-13 支付宝(杭州)信息技术有限公司 一种资源转移方法、装置、系统及物联网设备
CN115037790A (zh) * 2022-05-30 2022-09-09 平安银行股份有限公司 异常注册识别方法、装置、设备及存储介质
CN115577019A (zh) * 2022-12-07 2023-01-06 杭州恒生数字设备科技有限公司 口语测试方法、装置、设备及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110099047B (zh) * 2019-04-12 2021-09-07 平安科技(深圳)有限公司 注册信息处理方法、装置、计算机设备和存储介质
CN111243605A (zh) * 2020-01-13 2020-06-05 北京三快在线科技有限公司 业务处理方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320375A (zh) * 2014-08-28 2015-01-28 福建天晴数码有限公司 一种防止非法注册的方法和装置
CN107800678A (zh) * 2017-02-16 2018-03-13 平安科技(深圳)有限公司 检测终端异常注册的方法及装置
US20180124082A1 (en) * 2016-10-20 2018-05-03 New York University Classifying logins, for example as benign or malicious logins, in private networks such as enterprise networks for example
CN108696873A (zh) * 2018-05-08 2018-10-23 中国联合网络通信集团有限公司 虚假用户识别方法及装置
CN110099047A (zh) * 2019-04-12 2019-08-06 平安科技(深圳)有限公司 注册信息处理方法、装置、计算机设备和存储介质

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6978238B2 (en) * 1999-07-12 2005-12-20 Charles Schwab & Co., Inc. Method and system for identifying a user by voice
CN104184587B (zh) * 2014-08-08 2016-04-20 腾讯科技(深圳)有限公司 声纹生成方法、服务器、客户端及系统
CN104219050B (zh) * 2014-08-08 2015-11-11 腾讯科技(深圳)有限公司 声纹验证方法、服务器、客户端及系统
US9967173B2 (en) * 2015-07-31 2018-05-08 At&T Intellectual Property I, L.P. Method and apparatus for authentication and identity management of communicating devices
CN106375336A (zh) * 2016-09-28 2017-02-01 北京金山安全软件有限公司 登录信息存储、提供方法及装置
CN106507354B (zh) * 2016-11-29 2020-01-21 中国银联股份有限公司 用于防止移动设备恶意注册的方法及装置
CN108172230A (zh) * 2018-01-03 2018-06-15 平安科技(深圳)有限公司 基于声纹识别模型的声纹注册方法、终端装置及存储介质
CN108681934A (zh) * 2018-04-25 2018-10-19 厦门快商通信息技术有限公司 一种交易平台及其不良用户的识别方法
CN109147797B (zh) * 2018-10-18 2024-05-07 平安科技(深圳)有限公司 基于声纹识别的客服方法、装置、计算机设备及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320375A (zh) * 2014-08-28 2015-01-28 福建天晴数码有限公司 一种防止非法注册的方法和装置
US20180124082A1 (en) * 2016-10-20 2018-05-03 New York University Classifying logins, for example as benign or malicious logins, in private networks such as enterprise networks for example
CN107800678A (zh) * 2017-02-16 2018-03-13 平安科技(深圳)有限公司 检测终端异常注册的方法及装置
CN108696873A (zh) * 2018-05-08 2018-10-23 中国联合网络通信集团有限公司 虚假用户识别方法及装置
CN110099047A (zh) * 2019-04-12 2019-08-06 平安科技(深圳)有限公司 注册信息处理方法、装置、计算机设备和存储介质

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112818868A (zh) * 2021-02-03 2021-05-18 招联消费金融有限公司 基于行为序列特征数据的违规用户识别方法和装置
CN112818868B (zh) * 2021-02-03 2024-05-28 招联消费金融股份有限公司 基于行为序列特征数据的违规用户识别方法和装置
CN113259373A (zh) * 2021-06-08 2021-08-13 支付宝(杭州)信息技术有限公司 一种资源转移方法、装置、系统及物联网设备
CN115037790A (zh) * 2022-05-30 2022-09-09 平安银行股份有限公司 异常注册识别方法、装置、设备及存储介质
CN115037790B (zh) * 2022-05-30 2023-04-28 平安银行股份有限公司 异常注册识别方法、装置、设备及存储介质
CN115577019A (zh) * 2022-12-07 2023-01-06 杭州恒生数字设备科技有限公司 口语测试方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN110099047A (zh) 2019-08-06
CN110099047B (zh) 2021-09-07

Similar Documents

Publication Publication Date Title
WO2020206906A1 (fr) Procédé et appareil de traitement d'informations d'enregistrement, dispositif informatique et support de stockage
TWI738659B (zh) 電子簽章通信期之驗證出處的系統及方法
JP2022532677A (ja) 身元検証及び管理システム
US9979721B2 (en) Method, server, client and system for verifying verification codes
CN107196950B (zh) 校验方法、装置及服务端
US8973123B2 (en) Multifactor authentication
US9934310B2 (en) Determining repeat website users via browser uniqueness tracking
WO2021175019A1 (fr) Procédé de guidage pour enregistrement audio et vidéo, appareil, dispositif informatique, et support de stockage
CN108090351B (zh) 用于处理请求消息的方法和装置
WO2019037417A1 (fr) Procédé et appareil d'exploration de données de page web, plateforme d'exploration de données de page web et support d'informations
WO2016101635A1 (fr) Procédé, appareil et dispositif de synchronisation d'état de connexion, et support de stockage informatique
US20180188932A1 (en) De-anonymization of website visitor identity
CN104303483A (zh) 用于社交网络的基于用户的识别系统
CN110691085B (zh) 登录方法、装置、密码管理系统及计算机可读介质
US20150302089A1 (en) Recovery of Information from Commercial Web Portals
CA3142780A1 (fr) Procede d'acces a une page web, appareil, dispositif informatique et support de stockage
US10270771B1 (en) Mid-session live user authentication
WO2019153586A1 (fr) Procédé et appareil de traitement de données de dialogue en ligne, dispositif informatique et support d'informations
CN113343211B (zh) 数据处理方法、处理系统、电子设备及存储介质
US20210409389A1 (en) Systems and methods for determining knowledge-based authentication questions
CN109543398B (zh) 一种应用程序账户迁移方法、装置和电子设备
CN111695113A (zh) 终端软件安装合规性检测方法、装置和计算机设备
CN112769565A (zh) 密码加密算法的升级方法、装置、计算设备和介质
CN111652625A (zh) 认证方法及装置、电子设备、计算机可读存储介质
US11924199B1 (en) Systems and methods for user authentication using an imaged machine-readable identity document

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19924437

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19924437

Country of ref document: EP

Kind code of ref document: A1