[go: up one dir, main page]

CN108650098A - The method and device of User Defined verification mode - Google Patents

The method and device of User Defined verification mode Download PDF

Info

Publication number
CN108650098A
CN108650098A CN201810433357.7A CN201810433357A CN108650098A CN 108650098 A CN108650098 A CN 108650098A CN 201810433357 A CN201810433357 A CN 201810433357A CN 108650098 A CN108650098 A CN 108650098A
Authority
CN
China
Prior art keywords
user
verification
business
event
verification mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810433357.7A
Other languages
Chinese (zh)
Other versions
CN108650098B (en
Inventor
吕晨晨
管维刚
陈文鸿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810433357.7A priority Critical patent/CN108650098B/en
Publication of CN108650098A publication Critical patent/CN108650098A/en
Application granted granted Critical
Publication of CN108650098B publication Critical patent/CN108650098B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This specification embodiment provides a kind of method and apparatus of User Defined verification mode.In setup phase, the verification mode that user is arranged for a certain business is received, to allow user to judge for the importance of a certain business according to oneself, oneself defines the core body mode needed for this business.It uses the stage of business, client to be directed to this service request event in user, is directed to the verification mode that the business is arranged to server-side inquiry user, and core body verification is carried out to user according to such verification mode.

Description

The method and device of User Defined verification mode
Technical field
This specification one or more embodiment is related to field of computer technology more particularly to safe kernel body and identity is recognized Card.
Background technology
With the development of computer and Internet technology, type, the quantity of various client applications and App are growing day by day, The daily scene being related to is also more and more abundant, the various aspects affairs in life can by various client applications and App come It realizes.As the usage scenario and frequency of use of these applications and App are higher and higher, also bring it is more and more it is dangerous because Element, for example, criminal usurp others' account pay, transfer accounts, photos and sending messages etc..Therefore, safe kernel body and authentication are got over Come more important.
In routine techniques, it is general application or App be user identity is verified using single safety verification mode, such as By trading password, either the modes such as short-message verification or fingerprint carry out authentication.But such verification mode still compares It is thiner.If mobile phone or password are stolen, information is easy for leakage.
Accordingly, it would be desirable to there is improved plan, can safe kernel body and authentication more efficiently be carried out to user.
Invention content
This specification one or more embodiment describes a kind of method and apparatus, and user is allowed to be directed to different business, if Different verification modes is set, to meet the safety requirements that user verifies core body.
According in a first aspect, providing a kind of method of setting verification mode, this method is in client executing, this method packet It includes:
In response to the first operation of user, business option is provided a user, wherein first operation is for starting verification Mode is arranged;
In response to the second operation of user, verification mode option is provided a user, wherein second operation is from described The operation of the first business is selected in business option;
The third operation of user is received, the third operation is to select at least one verification from the verification mode option Mode;
Setting information is sent to server-side, the setting information includes at least the information of the user, first business Information and the information of at least one verification mode that is arranged for first business of the user.
According to a kind of possible design, before sending setting information to server-side, also according to the authentication of system setting Formula verifies user identity.
In one embodiment, above-mentioned verification mode option may include:It business recommended multiple is tested for described first Card mode;Or the user passes through multiple verification modes of verification.
In one embodiment, user can select from following verification mode:Trading password is verified, and short message is tested Card, face verification, fingerprint authentication, voice print verification.
According to second aspect, a kind of method of setting verification mode is provided, this method is executed in server-side, this method packet It includes:
Setting information is received, the setting information includes at least the information of user, the information of the first business, and at least one The information of a verification mode, wherein at least one verification mode is arranged by the user for first business;
The incidence relation between first business and at least one verification mode is stored for the user.
In a kind of possible design, above-mentioned incidence relation is stored using multistage-mapping table, the multistage-mapping table includes First order list item, second level list item and third level list item, the first order list item are used to store the user information of multiple users, the Two level list item be used for store each user available service information, third level list item for store each user for it is each can The verification mode information being arranged with business.
According to the third aspect, provide a kind of method of safety verification, this method in client executing, including:
In response to the service request event of user, inquiry request is sent out to server-side, the inquiry request is looked into for asking Ask the corresponding verification mode of the service request event;
At least one verification mode is obtained from server-side, at least one verification mode is directed to the industry by the user The corresponding business of business request event and be arranged;
User identity is verified using at least one verification mode.
In one embodiment, client includes that business platform and verification platform correspondingly send out inquiry to server-side Request specifically includes:
In response to the service request event, the event information of the business platform service request event is to service Request event is held to verify ID;
The business platform obtains the Event validation ID from the server-side, and Event validation ID is sent to described Verification platform;
The verification platform sends out the inquiry request based on the Event validation ID to the server-side.
According to fourth aspect, a kind of method for safety verification is provided, this method is executed in server-side, for assisting visitor Family end carries out safety verification, the method includes:
The inquiry request that the client end response is sent in the service request event of user is received, the inquiry request is used The corresponding verification mode of service request event described in requesting query;
According to the inquiry request, inquire the user be arranged for the corresponding business of the service request event to A few verification mode;
At least one verification mode is sent to the client.
In one embodiment, client includes that it is specific correspondingly to receive inquiry request for business platform and verification platform Including:
The event information that the business platform is sent in response to the service request event of user is received, the event is based on Information is that the service request event generates Event validation ID;
The Event validation ID is sent to the business platform;
The inquiry request is received from the verification platform, the inquiry request is generated based on the Event validation ID.
In one embodiment, inquiry user sets for the corresponding business of the service request event in the following manner At least one verification mode set:
The Event validation ID being based on according to inquiry request obtains the service request event corresponding to Event validation ID Event information;
Determine the user corresponding to service request event and business;
At least one authentication that the user is arranged for the business is inquired in pre-stored setting information Formula.
According to the 5th aspect, a kind of device of setting verification mode is provided, which is located at client, and includes:
First provides unit, is configured to the first operation in response to user, provides a user business option, wherein described the One operation is for starting verification mode setting;
Second provides unit, is configured to the second operation in response to user, provides a user verification mode option, wherein institute It is that the operation of the first business is selected from the business option to state the second operation;
Receiving unit is configured to receive the third operation of user, and the third operation is from the verification mode option Select at least one verification mode;
Transmission unit is configured to send setting information to server-side, and the setting information includes at least the letter of the user At least one authentication that breath, the information of first business and the user are arranged for first business The information of formula.
According to the 6th aspect, a kind of device of setting verification mode is provided, which is located at server-side, and includes:
Receiving unit is configured to receive setting information, and the setting information includes at least the information of user, the first business The information of information and at least one verification mode, wherein at least one verification mode by the user for described the One business and be arranged;
Storage unit is configured to store between first business and at least one verification mode for the user Incidence relation.
According to the 7th aspect, a kind of device of safety verification is provided, which is located at client, including:
Request unit is configured to the service request event in response to user, and inquiry request, the inquiry are sent out to server-side Request is for the corresponding verification mode of service request event described in requesting query;
Acquiring unit is configured to obtain at least one verification mode from server-side, and at least one verification mode is by institute User is stated for the corresponding business of the service request event to be arranged;
Authentication unit is configured to verify user identity using at least one verification mode.
According to eighth aspect, a kind of device for safety verification is provided, which is located at server-side, for assisting client End carries out safety verification, and described device includes:
Receiving unit is configured to receive the inquiry that the client end response is sent in the service request event of user and ask It asks, the inquiry request is for the corresponding verification mode of service request event described in requesting query;
Query unit is configured to, according to the inquiry request, inquire the user and correspond to for the service request event Business and at least one verification mode for being arranged;
Transmission unit is configured at least one verification mode being sent to the client.
According to the 9th aspect, a kind of computer readable storage medium is provided, computer program is stored thereon with, when described When computer program executes in a computer, enable computer execution first aspect to the method for fourth aspect.
According to the tenth aspect, a kind of computing device, including memory and processor are provided, which is characterized in that described to deposit It is stored with executable code in reservoir, when the processor executes the executable code, realizes first aspect to fourth aspect Method.
By the method and apparatus of this specification embodiment, user is allowed to be sentenced for the importance of a certain business according to oneself It is disconnected, oneself define the core body mode needed for this business.The stage of business, client is used to be directed to this service request in user Event is directed to the verification mode that the business is arranged to server-side inquiry user, and is carried out to user according to such verification mode Core body is verified.In this way, realizing that user is directed to the process of the self-defined verification mode of various businesses.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, others are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is the implement scene schematic diagram of one embodiment that this specification discloses;
Fig. 2 shows the method flow diagrams according to the setting verification mode of one embodiment;
Fig. 3 A show a schematic interface of the business option for being supplied to user;
Fig. 3 B show a schematic interface of the verification mode option for being supplied to user;
Fig. 4 shows the schematic diagram of the mapping table according to one embodiment;
The method that Fig. 5 shows the safety verification according to one embodiment;
Fig. 6 is shown according to one embodiment in the side for assisting client progress safety verification that server-side executes Method;
Fig. 7 shows the process of the safety verification according to one embodiment;
Fig. 8 shows the schematic block diagram that the device of verification mode is arranged in client according to one embodiment;
Fig. 9 shows the schematic block diagram that the device of verification mode is arranged in server-side according to one embodiment;
Figure 10 shows the schematic block diagram of the safety verification device in client according to one embodiment;
Figure 11 shows the schematic block diagram of the safety verification device in server-side according to one embodiment.
Specific implementation mode
Below in conjunction with the accompanying drawings, the scheme provided this specification is described.
Fig. 1 is the implement scene schematic diagram of one embodiment that this specification discloses.As shown in Figure 1, embodiment is in client It is executed between end and server-side.Client includes terminal device and various client applications installed therein and App, such as is propped up Pay treasured App;Server-side is corresponding with the service that client is provided.For many application services, multiple services can be used Device executes corresponding function respectively, and business function is executed for example, by using service server, is carried out using storage server extensive The storage of data executes security function etc. using security server.Server in Fig. 1 server-sides for example can be that Alipay is adopted High in the clouds security server.
Interaction between client and server-side is divided into two stages.In the first stage, client, which provides a user, is directed to The verification mode option of different business.In this way, user can judge the importance of a certain business according to oneself, oneself definition Core body mode needed for this business.Such as shown in Figure 1, user can be directed to loan transaction, setting trading password, short message and Three kinds of verification modes of face.User-defined verification mode can be stored in server-side, such as security server.
In second stage, user uses business, generates service request.For example, user prepares application loan, borrowed to generate Money is asked.At this point, client is directed to this service request event, to the verification mode needed for server-side inquiry.Server-side is inquired Verification mode is returned to client by the user for the verification mode set by the business.For example, server-side inquires, it should It is provided with three seed nucleus body mode of trading password, short message and face for loan transaction before user, then by these three authentications Formula returns to client.Client is then successively traded user the verification of password, short message and face.In this way, realizing user For the process of the self-defined verification mode of various businesses.The specific executive mode of above procedure is described below.
Fig. 2 shows the method flow diagrams according to the setting verification mode of one embodiment.This method is in client executing.Visitor Family end may include various computing terminals (such as PC machine), intelligent and portable equipment (such as mobile phone, tablet computer) and pacify thereon The application of dress and App.As shown in Fig. 2, the method for above-mentioned setting verification mode includes, step 21, in response to the first behaviour of user Make, provide a user business option, wherein first operation is for starting verification mode setting;Step 22, in response to user The second operation, verification mode option is provided a user, wherein second operation is selects first from the business option The operation of business;Step 23, receive the third operation of user, third operation for from the verification mode option selection to A few verification mode;Step 24, setting information is sent to server-side, the setting information includes at least the letter of the user At least one authentication that breath, the information of first business and the user are arranged for first business The information of formula.The execution of each step is described below.
First, in step 21 business option is provided a user in response to the operation of the startup verification mode setting of user. For the sake of simple and difference, the above-mentioned operation for starting verification mode setting is also known as the first operation.
In one embodiment, the entrance for providing customization verification mode to the user in client application, for example, paying Increase " setting safety verification " in precious " I " column, increases " setting peace in the column of similar " individual center " of other App Full verification " etc..In this way, the operation that user clicks to enter above-mentioned entrance is above-mentioned first operation, for starting verification mode Setting.Once receiving the operation that user starts verification mode setting, then business option is provided a user.Usually, business is selected Item is available including the user and user is supported to customize multiple business of verification mode.
Fig. 3 A show a schematic interface of the business option for being supplied to user.Enter " setting safety verification " in user After function, you can to business option shown in user's display diagram 3A.In figure 3 a, business option includes schematically loan industry Business, transferred account service tie up card/unbundlings card business, so that user selects.
Then, user can select the business that verification mode is arranged from business option.The operation quilt of the selection business Referred to as second operation, the business that user chooses are referred to as the first business.In figure 3 a, it is assumed that user has selected loan transaction.
Then, verification mode option is provided a user, the option in response to above-mentioned second operation of user in step 22 Including multiple alternative verification modes.Alternative verification mode may include that such as trading password is verified, short-message verification, face verification, Fingerprint authentication, voice print verification etc. verification mode.
In one embodiment, no matter which type of business user selects, institute is provided a user in verification mode option Possible verification mode, for user's unrestricted choice.In another embodiment, verification mode option includes that system is directed to user First business recommended verification mode of selection.In other words, user selects different business, is presented in verification mode option Alternative verification mode is possible to different.For example, the safety requirements rank that system can be directed to each business in advance is commented Estimate, for the higher business of safety requirements rank, such as loan transaction, then recommends the higher verification mode of security level, such as Fingerprint, face;It for the lower business of safety requirements rank, such as deposits, then recommends the general verification mode of security level, example Such as trading password.For there is the business of particular/special requirement, it can also pointedly recommend corresponding verification mode.For example, if with The business of family selection is the high security level business carried out for corporation account, then can be in verification mode option to user Verification mode for example based on LBS (location based service) is provided, which can verify operating position, with Ensure that corporation account is only operated within the scope of company position.
Based on above verification mode option, user can select from alternative verification mode therein.Correspondingly, In step 23, client receives the operation that user selects at least one verification mode from the verification mode option, the operation Also known as third operates.
In one embodiment, the user is only provided a user in verification mode option by the authentication of verification Formula.In another embodiment, all possible verification mode is provided in verification mode option.At this point, if in step 23 The verification mode of user's selection includes the not authenticated certain validation mode of user, then next to utilize the certain validation Mode verifies user identity.For example, if having selected fingerprint authentication, but not authenticated fingerprint before, then just It is verified it is required that user inputs fingerprint.
Fig. 3 B show a schematic interface of the verification mode option for being supplied to user.In figure 3b, verification mode is selected Item includes schematically trading password, short message, face, fingerprint, so that user selects.Then, user can be from authentication It selects oneself to think necessary verification mode in formula option.It is assumed that after user selects loan transaction in figure 3 a, for the loan Money business has selected three kinds of trading password, short message and face verification modes in figure 3b.
After the operation for receiving user's selection verification mode, in step 24, client sends setting letter to server-side Breath, wherein at least includes the information of user, and the information of the first business of user's selection and user set for first business The information at least one verification mode set, these setting informations are used to store and record for server-side user and are arranged for business Verification mode.In this way, completing the setting of the verification mode carried out in client.
In one embodiment, it in order to increase safety, prevents other people from falsely using user and carries out verification mode setting, in user After carrying out above-mentioned first operation, any stage before step 24 first carries out a core body verification to user.The verification of core body Mode can be preset by system.In this way, increasing the safety of verification mode setting.
With above-mentioned client correspondingly, server-side receives the setting information that above-mentioned client is sent, and to setting information It is stored and is recorded.As previously mentioned, the setting information received includes at least the information of user, the first business of user's selection Information and the information of at least one verification mode that is arranged for first business of user.For this purpose, server-side needs needle To each user, the incidence relation between storage service and the verification mode of setting.
In one embodiment, server-side stores above-mentioned incidence relation using multistage-mapping table.Multistage-mapping table includes the Level-one list item, second level list item and third level list item, user information of the first order list item for storing multiple users, second Grade list item is used to store the information of the available service of each user, and third level list item is for storing each user for each available The verification mode information of business setting.
Fig. 4 shows the schematic diagram of the mapping table according to one embodiment.It is used to deposit it is appreciated that the mapping table is server-side Store up the mapping table of the setting information of each user.As shown in figure 4, in the first order list item of the mapping table, each user is stored Information, such as User ID, including User1, User2 ...;In the second level list item of the mapping table, store each user's The information of available service, for example, user User1 available service:Loan, transfers accounts, and deposits, ties up card etc.;The of the mapping table In three-level list item, information of each user for the verification mode of each available service setting is stored, such as User1 is for loan Business is provided with trading password, short message, and three kinds of verification modes of face are provided with two kinds of trading password and short message for transferred account service Verification mode, for the verification mode for depositing and tying up card and be provided with trading password.
It is appreciated that server-side can also use the setting information of other forms storage user, limited herein not to this It is fixed.
In this way, in the first stage of this specification embodiment, i.e., user carries out the stage of verification mode setting, client's termination The setting operation of user is received, and is arranged and is sent to server-side, setting information of the server-side to each user for setting information It is stored and is recorded, so that, user can sentence the importance of every business based on oneself according to the needs of oneself It is disconnected, different verification modes is respectively set for every business.
Next description is in the second stage of embodiment, i.e. user is carries out the stage of safety verification using business, such as What guides user to complete authentication according to the personal settings of user.
The method that Fig. 5 shows the safety verification according to one embodiment, this method is in client executing.As shown in figure 5, should Method includes:Step 51, in response to the service request event of user, inquiry request is sent out to server-side, the inquiry request is used The corresponding verification mode of service request event described in requesting query;Step 52, it is obtained from server-side and the industry is directed to by user The corresponding business of business request event and at least one verification mode being arranged;Step 53, using above-mentioned at least one verification mode User identity is verified.
In one embodiment, client includes business platform and verification platform, and business platform is related for processing business Request, verification platform be used for for various businesses to user carry out authentication.In this case, step 51 is further Including following procedure:User sends out service request event, the event letter of the business platform service request event to business platform It ceases to server-side request event and verifies ID.After obtaining requested Event validation ID from server-side, business platform is by the thing Part verification ID is sent to verification platform.Then, verification platform sends out the inquiry request based on Event validation ID to server-side, To the corresponding verification mode of service request event described in requesting query.
Then, in step 52, client obtains the corresponding verification mode of service request event from server-side.In client packet In the case of including business platform and verification platform, in this step, the verification mode returned is received from server-side by verification platform.
Then in step 53, client uses the verification mode obtained from server-side to verify user identity.More Body, can subscriber authentication be carried out by the verification platform in client.
In one embodiment, in step 53, client, verification platform especially therein obtains user and is directed to successively Each verification information that set each verification mode provides, core body authentication center is sent to by each verification information so that Core body authentication center verifies user identity.
With the method shown in fig. 5 in client executing correspondingly, Fig. 6 is shown according to one embodiment in server-side The method of execution, this method include for assisting client to carry out safety verification:Step 61, receive client end response in The service request event at family and the inquiry request sent, the inquiry request are corresponding for service request event described in requesting query Verification mode;Step 62, it according to inquiry request, inquires the user and is arranged for the corresponding business of the service request event At least one verification mode;Step 63, above-mentioned at least one verification mode is sent to the client.
In one embodiment, client includes business platform and verification platform.Correspondingly, above-mentioned steps 61 include following Process:Server-side receives the event information that client traffic platform response is sent in the service request event of user, is based on thing Part information is that the service request event generates Event validation ID.In one embodiment, server-side is according to pre-defined rule, to thing Project in part information is encoded, to generate above-mentioned Event validation ID.In another embodiment, server-side is according to flowing water Number generate current Event validation ID.Then, the Event validation ID of generation is sent to business platform.As previously mentioned, business is flat Event validation ID can be transmitted to verification platform by platform.Then, next, server-side can be received from verification platform based on the thing Part verifies ID and the inquiry request that generates, to the corresponding verification mode of inquiry business request event.
Next, in step 62, the verification mode that user is arranged for the corresponding business of service request event is inquired.Such as It is preceding described, the setting information of each user is stored and had recorded in server-side, and industry can be used for items including each user The verification mode of business setting, such as shown in Fig. 4.Correspondingly, when receiving the inquiry request from client, server-side can To be inquired from the setting information of storage, which type of active user verify for the business of current service request event provided with Mode.
In one embodiment, inquiry request includes the business information of current user information and request.In such situation Under, server-side can be inquired directly from setting information, and active user is directed to the verification mode of requested business setting.
In another embodiment, inquiry request is generated based on above-mentioned Event validation ID.In the case, above-mentioned to inquire Journey may include the Event validation ID being based on first according to inquiry request, obtains the business corresponding to Event validation ID and asks Seek the event information of event.Then, according to above-mentioned event information, the user corresponding to service request event and industry are determined Business;Then, the verification mode that above-mentioned user is arranged for the business is inquired in pre-stored setting information mapping table.
Then, in step 63, the verification mode inquired is sent to client, so that client carries out safety verification.
The verification process of second stage is described with reference to Fig. 7.Fig. 7 shows the mistake of the safety verification according to one embodiment Journey.In the example in figure 7, client includes business platform and verification platform.
First, in step S01, user sends out service request to business platform, forms service request event.For example, one In a example, user (user01) utilization of a loan business.After user has filled in personal information, the amount of the loan, gathering card number, point When hitting " determining loan ", i.e., loan transaction request is sent out to business platform, form a service request event.
After business platform receives such service request, in step S02, the event letter of the service request event is obtained Breath.In one embodiment, the element of business platform extraction service request event, forms event information.Event information can wrap It includes:User information (such as userID), facility information, type of service, business serial number etc..For example, in above-mentioned user user01 In the case of utilization of a loan business, event information for example may include user name user01, the type number S01 of loan transaction, Amount of the loan 10k, business serial number xxxxxx, etc..
Then, in step S03, above-mentioned event information is sent to server-side by business platform, that is, using the event information to Server-side request event verifies ID.
After server-side receives above-mentioned event information, first in step S04, which is carried out preliminary Verification.This includes, such as verifies whether userID therein is legal, and whether the format for verifying various information is correct, etc..
After preliminary identification passes through, in step S05, server-side generates Event validation ID for the service request event, Also known as VID (Verify ID).In one example, server-side compiles the project in event information according to pre-defined rule Code, to generate above-mentioned Event validation ID.For example, can be by one character string of each item design in event information, to this Character string applies predictive encoding form, to generate VID.In another example, server-side generates current event according to serial number Event validation ID.Alternatively, in another example, server-side generates Event validation ID of the character string as current event at random.
In one example, for the service request event of above-mentioned user user01 utilization of a loan business, it is assumed that given birth to for it At Event validation ID be EV001.
It is appreciated that while generating Event validation ID, server-side stores generated Event validation ID and believes with event The correspondence of breath, in case subsequent query.
Then in step S06, the Event validation ID of generation is returned to business platform by server-side.
Then, in step S07, Event validation ID is transmitted to verification platform by business platform.Due to Event validation ID itself An only ID (such as EV001), and do not include in service request event with the relevant information of business, so avoid verification platform Unnecessary business information is got, to improve safety.
Verification platform, in step S08, can be based on Event validation ID after business platform receives Event validation ID Inquiry request is sent out to server-side, with requesting query current service request verification mode required for the event.
In step S09, server-side inquires the corresponding verification mode of current service request event.As previously mentioned, server-side exists While generating an Event validation ID, the correspondence of generated Event validation ID and event information can be stored.Therefore, exist When receiving inquiry request, server-side according to above-mentioned correspondence, obtains the Event validation ID institutes for including in inquiry request first The event information of corresponding service request event.Then, according to above-mentioned event information, the use corresponding to service request event is determined Family and business;Then, the authentication that above-mentioned user is arranged for the business is inquired in pre-stored information-setting by user Formula.For example, including Event validation ID in the inquiry request that server-side receives:EV001, then server-side can be fixed based on the ID Position outgoing event information, including, user name user01, the type number S01 of loan transaction, amount of the loan 10k, business flowing water Number xxxxxx, etc..According to above event information, it may be determined that the user corresponding to service request event is user01, industry Business is S01.Then, in pre-stored information-setting by user, user user01 can be inquired for set by business S01 Verification mode, such as including trading password, short message and face.
Then, in step S10, the verification mode inquired is returned to verification platform by server-side.
In step S11, verification platform issues the user with verification and requires successively for each verification mode obtained, and Step S12 obtains the verification information of user successively.For example, if the verification mode obtained is trading password, short message and face, So in step S11, user is required to input password successively, verifies short message and face information obtains user respectively in step S12 The password of input verifies short message content and face information.
Then, in step S13, verification information input by user is sent to authentication center by verification platform.In most business In application scenarios, use and client, and the independent authentication center of security server with server-side, it is exclusively used in carrying out body Part verification.Certainly in some scenes, authentication center also can be incorporated in the certain server of server-side.
Authentication center, in step S14, is tested verification information after client validation platform receives verification information Card.Then it in step S15, by verification result, for example is verified or authentication failed, is sent to client validation platform, then Verification platform can notify verification result to business platform.
Business platform then can be according to verification result, it is determined whether user is allowed to continue current service request.
In the case where user is provided with multiple verification modes for current business, need multiple verification modes by testing Card is just considered to be verified.For example, in one example, verification platform believes trading password, short-message verification content and face Breath be sent to authentication center, authentication center respectively verifies these three verification modes, only when each single item verification information with When reserved standard information matches respectively, the result being verified just is returned into client.
By above mode, when user uses business, according to user for the verification mode pair set by the business User identity is verified.
In one embodiment, in the case where notifying business platform to be verified, business platform also carries out secondary verification, To increase safety.This it is secondary verification can be used for judging, verification platform whether really to server-side initiated inquiry, and according to Query result verifies user.The process of secondary verification may include that business platform again sends Event validation ID To server-side, request server-side judges the whether requested inquiries of Event validation ID.If verification platform is tested based on event before Card ID has initiated inquiry request to server-side, then corresponding api interface will be called.Server-side can be connect by corresponding A PI The called record of mouth, judges whether corresponding Event validation ID is queried, and such judging result is returned to business platform. In one embodiment, server-side can also inquire the verification mode obtained corresponding to Event validation ID again, return it into To business platform.In this way, business platform can be by testing in this verification mode and verification result notice from server-side acquisition Card mode is compared, further to be confirmed.
It is appreciated that there is also the modes of more kinds of secondary verifications.These modes may be used further to consolidate core The safety of body verification.
By embodiment of above, user is allowed to judge that oneself definition should for the importance of a certain business according to oneself Core body mode needed for item business.The stage of business is used in user, client is directed to this service request event, to server-side The verification mode that user is directed to business setting is inquired, and core body verification is carried out to user according to such verification mode.In this way, Realize that user is directed to the process of the self-defined verification mode of various businesses.
According to the embodiment of another aspect, a kind of device of setting verification mode is provided in client.Fig. 8 is shown according to one The schematic block diagram of the device of the setting verification mode of a embodiment.It is to be appreciated that the setting device 80 of Fig. 8 is located at client Hold side.As shown in figure 8, setting device 80 includes:First provides unit 81, is configured to the first operation in response to user, to User provides business option, wherein first operation is for starting verification mode setting;Second provides unit 82, is configured to ring Verification mode option should be provided a user in the second operation of user, wherein second operation is from the business option Select the operation of the first business;Receiving unit 83 is configured to receive the third operation of user, and the third operation is to be tested from described At least one verification mode is selected in card mode option;Transmission unit 84 is configured to send setting information to server-side, described to set For confidence breath including at least the information of the user, the information of first business and the user are directed to first business And the information at least one verification mode being arranged.
In one embodiment, above-mentioned apparatus 80 further includes the first authentication unit (not shown), is configured to, to server-side Before sending setting information, according to the verification mode that system is arranged, user identity is verified.
In one embodiment, the second verification mode option for being provided of offer unit 82 includes:For first industry Multiple verification modes that business is recommended;Or the user passes through multiple verification modes of verification.
In one embodiment, at least one verification mode of user's selection includes that not authenticated specific of user is tested Card mode;Correspondingly, device 80 further includes the second authentication unit (not shown), be configured in the way of the certain validation to Family identity is verified.
According to one embodiment, above-mentioned at least one verification mode include it is following in it is one or more:Trading password is tested Card, short-message verification, face verification, fingerprint authentication, voice print verification.
According to the embodiment of another aspect, a kind of device of setting verification mode is provided in server-side.Fig. 9 is shown according to one The schematic block diagram of the device of the setting verification mode of a embodiment.It is to be appreciated that the setting device 90 of Fig. 9 is located at service Hold side.As shown in figure 9, setting device 90 includes:Receiving unit 91 is configured to receive setting information, and the setting information is extremely Include the information of the information of user, the information of the first business and at least one verification mode less, at least one is tested wherein described Card mode is arranged by the user for first business;And storage unit 92, it is configured to store for the user Incidence relation between first business and at least one verification mode.
In one embodiment, storage unit 92 is configured to, and the incidence relation is stored using multistage-mapping table, described more Grade mapping table includes first order list item, second level list item and third level list item, and the first order list item is for storing multiple users User information, second level list item be used for store each user available service information, third level list item for store it is each User is directed to the verification mode information of each available service setting.
Embodiment according to another aspect provides a kind of device of safety verification in client.Figure 10 is shown according to one The schematic block diagram of the safety verification device of embodiment.It is to be appreciated that the verification device 100 of Figure 10 is located at client one Side.As shown in Figure 10, verification device 100 includes:Request unit 101 is configured to the service request event in response to user, to clothes Business end sends out inquiry request, and the inquiry request is for the corresponding verification mode of service request event described in requesting query;It obtains Unit 102 is configured to obtain at least one verification mode from server-side, and at least one verification mode is directed to by the user The corresponding business of the service request event and be arranged;Authentication unit 103 is configured to use at least one verification mode pair User identity is verified.
In one embodiment, request unit 101 includes business module 1011 and authentication module 1012, wherein business module 1011 are configured to, and in response to the service request event, thing is asked to server-side with the event information of the service request event Part verifies ID, obtains the Event validation ID from the server-side, and Event validation ID is sent to the authentication module 1012;Authentication module 1012 is configured to, and the inquiry request is sent out to the server-side based on the Event validation ID.
According to a kind of embodiment, above-mentioned event information includes at least one of the following:User information, facility information, Type of service, business serial number.
In one embodiment, above-mentioned authentication unit 103 is configured to, and is obtained user successively and is directed at least one verification Each verification information that each verification mode provides in mode, is sent to core body authentication center so that core by each verification information Body authentication center verifies user identity.
Embodiment according to another aspect provides a kind of device for safety verification in server-side.Figure 11 shows basis The schematic block diagram of the safety verification device of one embodiment.It is to be appreciated that the verification device 110 of Figure 11 is located at server-side Side, for assisting client to carry out safety verification.As shown in figure 11, device 110 includes:Receiving unit 111 is configured to receive The inquiry request that the client end response is sent in the service request event of user, the inquiry request are used for requesting query institute State the corresponding verification mode of service request event;Query unit 112 is configured to, according to the inquiry request, inquire the user At least one verification mode being arranged for the corresponding business of the service request event;And transmission unit 113, it is configured to At least one verification mode is sent to the client.
In one embodiment, client includes business platform and verification platform.Correspondingly, service terminal device 110 connects Unit 111 is received to be configured to:The event information that business platform is sent in response to the service request event of user is received, based on described Event information is that the service request event generates Event validation ID;The Event validation ID is sent to the business platform; The inquiry request is received from the verification platform, the inquiry request is generated based on the Event validation ID.
According to a kind of embodiment, above-mentioned event information includes at least one of the following:User information, facility information, Type of service, business serial number.
In one embodiment, above-mentioned receiving unit 111 carries out the project in the event information according to pre-defined rule Coding, to generate the Event validation ID.
According to a kind of embodiment, query unit 112 is configured to:The Event validation being based on according to the inquiry request ID obtains the event information of the service request event corresponding to Event validation ID;It determines according to corresponding to service request event User and business;That inquires that the user is arranged for the business in pre-stored setting information at least one tests Card mode.
According to the embodiment of another aspect, a kind of computer readable storage medium is also provided, is stored thereon with computer journey Sequence enables computer execute and combines method described in Fig. 2, Fig. 5 and Fig. 6 when the computer program executes in a computer.
According to the embodiment of another further aspect, a kind of computing device, including memory and processor, the memory are also provided In be stored with executable code, when the processor executes the executable code, realize in conjunction with described in Fig. 2, Fig. 5 and Fig. 6 Method.
Those skilled in the art are it will be appreciated that in said one or multiple examples, work(described in the invention It can be realized with hardware, software, firmware or their arbitrary combination.It when implemented in software, can be by these functions Storage in computer-readable medium or as on computer-readable medium one or more instructions or code be transmitted.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention Protection domain, all any modification, equivalent substitution, improvement and etc. on the basis of technical scheme of the present invention, done should all Including within protection scope of the present invention.

Claims (34)

1. a kind of method of setting verification mode, this method include in client executing, this method:
In response to the first operation of user, business option is provided a user, wherein first operation is for starting verification mode Setting;
In response to the second operation of user, verification mode option is provided a user, wherein second operation is from the business The operation of the first business is selected in option;
The third operation of user is received, the third operation is to select at least one authentication from the verification mode option Formula;
Setting information is sent to server-side, the setting information includes at least the information of the user, the letter of first business The information at least one verification mode that breath and the user are arranged for first business.
2. according to the method described in claim 1, wherein further including, according to system before sending setting information to server-side The verification mode of setting, verifies user identity.
3. according to the method described in claim 1, wherein, the verification mode option includes:
For described first business recommended multiple verification modes;Or
The user passes through multiple verification modes of verification.
4. according to the method described in claim 1, wherein described at least one verification mode includes not authenticated specific of user Verification mode, the method further include being verified to user identity in the way of the certain validation.
5. according to the method described in claim 1, wherein described at least one verification mode include it is following in it is one or more: Trading password is verified, short-message verification, face verification, fingerprint authentication, voice print verification.
6. a kind of method of setting verification mode, this method are executed in server-side, this method includes:
Receive setting information, the setting information includes at least the information of user, the information of the first business and at least one tests The information of card mode, wherein at least one verification mode is arranged by the user for first business;
The incidence relation between first business and at least one verification mode is stored for the user.
7. according to the method described in claim 6, be wherein directed to the user store first business with it is described at least one Incidence relation between verification mode includes storing the incidence relation using multistage-mapping table, the multistage-mapping table includes First order list item, second level list item and third level list item, the first order list item are used to store the user information of multiple users, the Two level list item be used for store each user available service information, third level list item for store each user for it is each can The verification mode information being arranged with business.
8. a kind of method of safety verification, this method in client executing, including:
In response to the service request event of user, inquiry request is sent out to server-side, the inquiry request is used for requesting query institute State the corresponding verification mode of service request event;
At least one verification mode is obtained from server-side, at least one verification mode is asked by the user for the business It seeks the corresponding business of event and is arranged;
User identity is verified using at least one verification mode.
9. according to the method described in claim 8, the wherein described client includes business platform and verification platform, it is described in response to The service request event of user, sending out inquiry request to server-side includes:
In response to the service request event, the business platform is asked with the event information of the service request event to server-side Seek Event validation ID;
The business platform obtains the Event validation ID from the server-side, and Event validation ID is sent to the verification Platform;
The verification platform sends out the inquiry request based on the Event validation ID to the server-side.
10. according to the method described in claim 9, the wherein described event information includes at least one of the following:User information, Facility information, type of service, business serial number.
11. according to the method described in claim 8, wherein described carry out user identity using at least one verification mode Verification includes obtaining user successively for each verification letter that each verification mode provides at least one verification mode Breath, is sent to core body authentication center so that core body authentication center verifies user identity by each verification information.
12. a kind of method for safety verification, this method is executed in server-side, for assisting client to carry out safety verification, The method includes:
The inquiry request that the client end response is sent in the service request event of user is received, the inquiry request is for asking Seek the corresponding verification mode of the inquiry service request event;
According to the inquiry request, the user is arranged for the corresponding business of the service request event at least one is inquired A verification mode;
At least one verification mode is sent to the client.
13. according to the method for claim 12, wherein the client includes business platform and verification platform, the reception The inquiry request that the client end response is sent in the service request event of user includes:
The event information that the business platform is sent in response to the service request event of user is received, the event information is based on Event validation ID is generated for the service request event;
The Event validation ID is sent to the business platform;
The inquiry request is received from the verification platform, the inquiry request is generated based on the Event validation ID.
14. according to the method for claim 13, wherein the event information includes at least one of the following:User believes Breath, facility information, type of service, business serial number.
15. the method according to claim 13 or 14, wherein being given birth to for the service request event based on the event information Include at Event validation ID:The project in the event information is encoded according to pre-defined rule, to generate the event Verify ID.
16. according to the method for claim 13, wherein inquiring the user is directed to the corresponding industry of the service request event Business and be arranged at least one verification mode include:
The Event validation ID being based on according to the inquiry request obtains the service request event corresponding to Event validation ID Event information;
Determine the user corresponding to service request event and business;
At least one verification mode that the user is arranged for the business is inquired in pre-stored setting information.
17. a kind of device of setting verification mode, which is located at client, and includes:
First provides unit, is configured to the first operation in response to user, provides a user business option, wherein first behaviour It acts on and starts verification mode setting;
Second provides unit, is configured to the second operation in response to user, provides a user verification mode option, wherein described the Two operations are that the operation of the first business is selected from the business option;
Receiving unit is configured to receive the third operation of user, and the third operation is to be selected from the verification mode option At least one verification mode;
Transmission unit is configured to send setting information to server-side, and the setting information includes at least the information of the user, institute State the information of the first business and the letter of at least one verification mode that the user is arranged for first business Breath.
18. device according to claim 17 further includes the first authentication unit, is configured to, it is arranged being sent to server-side Before information, according to the verification mode that system is arranged, user identity is verified.
19. device according to claim 17, wherein the verification mode option includes:
For described first business recommended multiple verification modes;Or
The user passes through multiple verification modes of verification.
20. device according to claim 17, wherein at least one verification mode includes the not authenticated spy of user Determine verification mode, described device further includes the second authentication unit, be configured in the way of the certain validation to user identity into Row verification.
21. device according to claim 17, wherein at least one verification mode include it is following in one or more :Trading password is verified, short-message verification, face verification, fingerprint authentication, voice print verification.
22. a kind of device of setting verification mode, which is located at server-side, and includes:
Receiving unit is configured to receive setting information, and the setting information includes at least the information of user, the letter of the first business The information of breath and at least one verification mode, wherein at least one verification mode is directed to described first by the user Business and be arranged;
Storage unit is configured to store the pass between first business and at least one verification mode for the user Connection relationship.
23. device according to claim 22, wherein the memory cell arrangements are, described in the storage of multistage-mapping table Incidence relation, the multistage-mapping table include first order list item, second level list item and third level list item, and the first order list item is used In the user information for storing multiple users, second level list item is used to store the information of the available service of each user, third level table Item is directed to the verification mode information of each available service setting for storing each user.
24. a kind of device of safety verification, which is located at client, including:
Request unit is configured to the service request event in response to user, and inquiry request, the inquiry request are sent out to server-side For the corresponding verification mode of service request event described in requesting query;
Acquiring unit is configured to obtain at least one verification mode from server-side, and at least one verification mode is by the use Family is arranged for the corresponding business of the service request event;
Authentication unit is configured to verify user identity using at least one verification mode.
25. device according to claim 24, wherein the request unit includes business module and authentication module,
The business module is configured to, in response to the service request event, with the event information of the service request event to Server-side request event verifies ID, obtains the Event validation ID from the server-side, and Event validation ID is sent to institute State authentication module;
The authentication module is configured to, and the inquiry request is sent out to the server-side based on the Event validation ID.
26. device according to claim 25, wherein the event information includes at least one of the following:User believes Breath, facility information, type of service, business serial number.
27. device according to claim 24, wherein the verification units configured is, obtain successively user for it is described extremely Each verification information is sent in the verification of core body by each verification information that each verification mode provides in a few verification mode The heart so that core body authentication center verifies user identity.
28. a kind of device for safety verification, which is located at server-side, for assisting client to carry out safety verification, institute Stating device includes:
Receiving unit is configured to receive the inquiry request that the client end response is sent in the service request event of user, institute Inquiry request is stated for the corresponding verification mode of service request event described in requesting query;
Query unit is configured to, according to the inquiry request, inquire the user and be directed to the corresponding industry of the service request event At least one verification mode of business and setting;
Transmission unit is configured at least one verification mode being sent to the client.
29. device according to claim 28, wherein the client includes business platform and verification platform, the reception Unit is configured to:
The event information that the business platform is sent in response to the service request event of user is received, the event information is based on Event validation ID is generated for the service request event;
The Event validation ID is sent to the business platform;
The inquiry request is received from the verification platform, the inquiry request is generated based on the Event validation ID.
30. device according to claim 29, wherein the event information includes at least one of the following:User believes Breath, facility information, type of service, business serial number.
31. the device according to claim 29 or 30, wherein it is the industry that the receiving unit, which is based on the event information, Business request event generates Event validation ID:The project in the event information is encoded according to pre-defined rule, to Generate the Event validation ID.
32. device according to claim 29, wherein the query unit is configured to:
The Event validation ID being based on according to the inquiry request obtains the service request event corresponding to Event validation ID Event information;
Determine the user corresponding to service request event and business;
At least one verification mode that the user is arranged for the business is inquired in pre-stored setting information.
33. a kind of computer readable storage medium, is stored thereon with computer program, when the computer program in a computer When execution, computer perform claim is enabled to require the method for any one of 1-16.
34. a kind of computing device, including memory and processor, which is characterized in that be stored with executable generation in the memory Code when the processor executes the executable code, realizes the method described in any one of claim 1-16.
CN201810433357.7A 2018-05-08 2018-05-08 Method and device for user-defined verification mode Active CN108650098B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810433357.7A CN108650098B (en) 2018-05-08 2018-05-08 Method and device for user-defined verification mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810433357.7A CN108650098B (en) 2018-05-08 2018-05-08 Method and device for user-defined verification mode

Publications (2)

Publication Number Publication Date
CN108650098A true CN108650098A (en) 2018-10-12
CN108650098B CN108650098B (en) 2021-04-20

Family

ID=63749771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810433357.7A Active CN108650098B (en) 2018-05-08 2018-05-08 Method and device for user-defined verification mode

Country Status (1)

Country Link
CN (1) CN108650098B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109842611A (en) * 2018-12-14 2019-06-04 平安科技(深圳)有限公司 Auth method, device, computer equipment and storage medium
CN110071915A (en) * 2019-04-10 2019-07-30 阿里巴巴集团控股有限公司 A kind of identity verification product method for pushing, device, equipment and system architecture
WO2020093817A1 (en) * 2018-11-05 2020-05-14 阿里巴巴集团控股有限公司 Identity verification method and device
CN111415246A (en) * 2020-04-08 2020-07-14 中国银行股份有限公司 Online business processing method and device for bank outlets
CN113781051A (en) * 2021-09-06 2021-12-10 中国银行股份有限公司 Abnormal operation monitoring method and system
CN113869905A (en) * 2021-09-06 2021-12-31 中国银行股份有限公司 Abnormal transaction monitoring method and system
CN113904934A (en) * 2021-12-09 2022-01-07 之江实验室 A kind of high security device configuration method and device based on heterogeneous verification
CN114036494A (en) * 2021-12-02 2022-02-11 神州数码融信软件有限公司 Factorized dynamic authentication process management method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6138005A (en) * 1997-01-22 2000-10-24 Samsung Electronics Co., Ltd. Method for verifying personalization in mobile radio terminal
CN1992596A (en) * 2005-12-27 2007-07-04 国际商业机器公司 User authentication device and method
CN101156352A (en) * 2006-01-24 2008-04-02 华为技术有限公司 Authentication method, system and authentication center based on mobile network end-to-end communication
CN105578384A (en) * 2015-05-28 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Business information storage method and device
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6138005A (en) * 1997-01-22 2000-10-24 Samsung Electronics Co., Ltd. Method for verifying personalization in mobile radio terminal
CN1992596A (en) * 2005-12-27 2007-07-04 国际商业机器公司 User authentication device and method
CN101156352A (en) * 2006-01-24 2008-04-02 华为技术有限公司 Authentication method, system and authentication center based on mobile network end-to-end communication
CN105578384A (en) * 2015-05-28 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Business information storage method and device
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020093817A1 (en) * 2018-11-05 2020-05-14 阿里巴巴集团控股有限公司 Identity verification method and device
CN109842611A (en) * 2018-12-14 2019-06-04 平安科技(深圳)有限公司 Auth method, device, computer equipment and storage medium
CN110071915A (en) * 2019-04-10 2019-07-30 阿里巴巴集团控股有限公司 A kind of identity verification product method for pushing, device, equipment and system architecture
CN110071915B (en) * 2019-04-10 2021-08-06 创新先进技术有限公司 Identity verification product pushing method, device, equipment and system architecture
CN113872952A (en) * 2019-04-10 2021-12-31 创新先进技术有限公司 Identity verification product pushing method, device, equipment and system architecture
CN113872952B (en) * 2019-04-10 2023-11-28 创新先进技术有限公司 Method, device, equipment and system architecture for pushing identity verification product
CN111415246A (en) * 2020-04-08 2020-07-14 中国银行股份有限公司 Online business processing method and device for bank outlets
CN111415246B (en) * 2020-04-08 2023-04-18 中国银行股份有限公司 Online business processing method and device for bank outlets
CN113781051A (en) * 2021-09-06 2021-12-10 中国银行股份有限公司 Abnormal operation monitoring method and system
CN113869905A (en) * 2021-09-06 2021-12-31 中国银行股份有限公司 Abnormal transaction monitoring method and system
CN114036494A (en) * 2021-12-02 2022-02-11 神州数码融信软件有限公司 Factorized dynamic authentication process management method
CN113904934A (en) * 2021-12-09 2022-01-07 之江实验室 A kind of high security device configuration method and device based on heterogeneous verification

Also Published As

Publication number Publication date
CN108650098B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
CN108650098A (en) The method and device of User Defined verification mode
US8055558B2 (en) Method and system for authentication via communication terminal using short message
CN107018119B (en) Identity verification system, method and platform
CN102217280B (en) Method, system, and server for user service authentication
EP1615097B1 (en) Dual-path-pre-approval authentication method
CN105814591A (en) Verification information transmission method and terminal
CN108683871A (en) Video-based service processing system, method, user terminal and storage medium
CN105897721B (en) Verify the method and device of fiscard user identity reliability
KR20150140839A (en) Method and system for activating credentials
KR20100038990A (en) Apparatus and method of secrity authenticate in network authenticate system
CN113179282A (en) Method and device for merging account numbers and server
CN110135136A (en) Account fusion method, device, computer equipment and storage medium
CN109379388B (en) Identity recognition method, terminal and wearable device
JP2009245273A (en) Individual identification system and method
CN110766388B (en) Virtual card generation method and system and electronic equipment
CN114707976A (en) Payment method, user terminal, device, equipment, system and medium
KR20150053422A (en) Certification telephone number management server and method for managing certification telephone number, and electronic business server and method for certificating electronic business
KR102140453B1 (en) Meeting management method and meeting management system using the method
CN104252676A (en) System and method for using real-time communication and digital certificate to authenticate Internet bank account identity
US20100222022A1 (en) Communication method, communication system and access method to service provider base
CN110048926B (en) User circulation method, system, medium and electronic device based on WeChat public number
CN108173749B (en) Mobile payment method and device based on big data and mobile terminal
WO2010066277A1 (en) Data communication method and system for providing a financial transaction
WO2024016634A1 (en) Smart routing-based remote payment method and apparatus, terminal, system, and medium
KR101331575B1 (en) Method and system blocking for detour hacking of telephone certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1261856

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201022

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201022

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant