CN114915439A - E-commerce platform identity verification method and device, electronic equipment and storage medium - Google Patents
E-commerce platform identity verification method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114915439A CN114915439A CN202111588597.2A CN202111588597A CN114915439A CN 114915439 A CN114915439 A CN 114915439A CN 202111588597 A CN202111588597 A CN 202111588597A CN 114915439 A CN114915439 A CN 114915439A
- Authority
- CN
- China
- Prior art keywords
- user
- login
- data
- terminal
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 91
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004590 computer program Methods 0.000 claims description 10
- 238000011156 evaluation Methods 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 8
- 238000013480 data collection Methods 0.000 claims description 5
- 238000013500 data storage Methods 0.000 claims description 3
- 230000002265 prevention Effects 0.000 claims description 3
- 230000008901 benefit Effects 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 11
- 238000004891 communication Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000012502 risk assessment Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000000875 corresponding effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- Accounting & Taxation (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
- Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
Abstract
The application discloses a method and a device for verifying the identity of an e-commerce platform, electronic equipment and a storage medium. The method has the advantages that the E-commerce terminal performs identity recognition operation on the corresponding user, so that login information sent by the user is acquired, the user can perform login operation through different user terminals, and can acquire the portrait or the fingerprint of the user by using a mobile phone, a computer and the like to perform login, so that the application range is wider; e-commerce terminal receives user data and transmits to cloud terminal, compare with the inside data of cloud terminal, the security is higher, obtain the contrast result after the contrast is accomplished, by E-commerce client with the identity voucher of contrast data user, the application scene waits to verify the identity inquiry information and sends to the safety server in, verify by the safety server, assess user's login risk, E-commerce terminal receives authentication information, prevent that other people from logging in, multiple verification protection, the security is higher, more be worth using.
Description
Technical Field
The application relates to the technical field of computers, in particular to a method, a device, equipment and a storage medium for identity verification of an e-commerce platform.
Background
In the current e-commerce technical field, the e-commerce platform needs to verify the identity of a user so as to facilitate the user to log in.
As shown in fig. 1, in the related art, in the electronic morning operation performed by using an internet platform, a user logs in an e-commerce terminal through multiple user terminals and then performs business activities, and during this process, the user logs in the e-commerce terminal, and is prone to have a request of number stealing or information verification error, and the security of the user logging in the e-commerce terminal by using the user terminal and the convenience of the user logging in need to be improved.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present application provide a method, an apparatus, an electronic device, and a computer storage medium for e-commerce platform identity verification to solve the technical problems mentioned in the background section above.
As a first aspect of the present application, some embodiments of the present application provide an e-commerce platform identity verification method, including: and the E-commerce terminal responds to the identity recognition operation of the user to acquire the information sent by the user.
The user can log in through the user terminal, is connected with the e-commerce terminal, performs face or fingerprint identification through the user terminal, and uploads the login data of the user.
And the E-commerce terminal receives the user data, uploads the user data to a cloud terminal, reads the data of the cloud terminal, and compares the data with the user data through a database of the cloud terminal.
The cloud terminal is used for storing data, and the data storage cost is saved.
And predicting identity query information of the user to be verified to be sent to a security server based on the comparison between the user data and the cloud terminal data and the identity certificate and the application scene of the user to be verified.
The user data comprises login information, a login place and a network connected during login of the user.
And the safety server detects the safety of the user information and the login risk for evaluation, and sends evaluation information to the e-commerce terminal.
And the security server detects the comparison result of the user information and the cloud terminal data, evaluates the user login place and the connected network, and prevents the user from stealing the number and the like through the same network.
And the E-commerce terminal receives the evaluation result and carries out identity verification.
And when the identity authentication is passed, allowing the user to perform login operation based on the identity authentication information result.
And simultaneously uploading login information of the user and user data in the verification process to the cloud terminal to obtain a login record.
The e-commerce terminal enables a user to log in, and after the user data are uploaded to the cloud terminal, the data in the cloud terminal are added, so that data comparison can be conveniently carried out when the user logs in next time, the login speed of the user is improved, and the waiting time of the user is reduced.
And after the identity authentication is not passed, the user uses other login prevention to confirm the secondary information.
And the security server receives a secondary identity verification instruction.
And a secondary login opportunity is increased, so that the user is prevented from being unable to log in due to the error of the user comparison data.
The security of the secondary authentication performed by the security server is higher.
The safety server sends a short message verification code or a voice verification code to a user terminal, and the user terminal receives the short message verification code or the voice verification code sent by the safety server and inputs the received short message verification code or the received voice verification code into the E-commerce terminal.
The e-commerce terminal sends the received user verification data to the security server, and the security server performs verification, so that verification efficiency is improved.
And the voice verification initiates a voice call to the user by using an intelligent outbound system.
And after the user connects the voice call, broadcasting the identity authentication result to the E-commerce terminal.
And when the secondary login information passes, allowing the user to perform login operation based on the secondary identity authentication information structure.
After the user logs in, the e-commerce terminal uploads the secondary identity authentication information and the login information to the cloud terminal and the security server, the cloud terminal records user registration records, and the cloud terminal comparison efficiency is improved when the user logs in next time.
And when the secondary login information does not pass, refusing the user to login, and uploading the user login information to the security server.
The security server marks the login as dangerous login information, and compares the dangerous login information with the next login, so that the resolution efficiency of dangerous login is improved.
As a second aspect of the present application, some embodiments of the present application provide an e-commerce platform identity verification apparatus, including: the first receiving module receives the login data in the user terminal, can receive data of various terminals of a mobile phone terminal and a computer terminal, and is wider in application range.
The cloud terminal is used for storing user data and searching comparison data of the user data in the cloud terminal.
The first verification module verifies the user data and the comparison data, verifies the identity certificate and the application scene of the user, predicts the identity inquiry information of the user to be verified, evaluates the user information safety and the login risk, and judges whether the user logs in.
And the data collection module is used for collecting login data of a user, accumulating the user data and improving the comparison time for the next login.
And the sending module sends the short message verification code to the user terminal and initiates a voice call to the user through the intelligent outbound system.
And the second receiving module is used for receiving the short message verification code of the user and receiving the voice broadcast of the user.
And the second verification module is used for verifying the short message verification code and the voice broadcast verification code, judging the accuracy of user data and facilitating the login of the user in various verification modes.
As a third aspect of the present application, some embodiments of the present application provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method described in any of the implementations of the first aspect.
As a fourth aspect of the present application, some embodiments of the present application provide a computer storage medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect.
The beneficial effect of this application lies in: a method, device, equipment and storage medium for E-commerce platform identity authentication, the E-commerce terminal corresponds to the identity identification operation of a user, and then obtains login information sent by the user, the user can perform login operation through different user terminals, and can obtain a portrait or a fingerprint of the user by using a mobile phone, a computer and the like for login, so that the application range is wider; the E-commerce terminal receives user data and transmits the user data to the cloud terminal, the user data is compared with data in the cloud terminal, a comparison result is obtained after the comparison is finished, the E-commerce client sends identity credentials of a comparison data user and identity query information to be verified in an application scene to the security server, the security server performs verification to evaluate the login risk of the user, the E-commerce terminal receives identity verification information to prevent others from logging in, multiple verification protection is performed, and the security is higher; the method comprises the steps that an identity authentication result passes, a user is allowed to log in based on identity authentication, meanwhile, user login information is uploaded to a cloud terminal, the login history of the user is recorded, when the identity authentication result does not pass, secondary information confirmation is carried out by other devices, the secondary information confirmation can be sent to the user terminal through a short message verification code or a voice verification code, the short message verification code or voice is received and verified by a security server, after the secondary login information passes, the user login operation is allowed to record the user login record through the security server, key marking is carried out, after the secondary login information does not pass, user login is refused, the login information is uploaded to the security server, and the login information is marked as dangerous login, so that the login security of the user is improved.
More specifically, some embodiments of the present application may produce the following specific benefits:
1. the user can log in through various user terminals, including a mobile phone or a computer and the like, so that the use is more convenient and the operation is simpler;
2. the user logs in through facial recognition or fingerprint recognition, uploads login data, and facial or fingerprint recognition operation is comparatively simple, and login efficiency is higher.
3. The e-commerce terminal transmits the user data to the cloud terminal for matching, and the cloud terminal is low in data storage cost and data use cost.
4. The safety server combines the comparison data to evaluate the login risk of the user in the login environment, and then controls whether the user logs in, so that the environmental risk can be controlled, and the number stealing and the like can be prevented.
5. And the identity authentication result is that the user can log in for the second time when the user passes the authentication result, the identity authentication is carried out through the short message authentication code or the voice authentication code, the login information of the user is uploaded to the security server after the user passes the authentication result for the second time, the login information is marked as dangerous login, login comparison data can be provided for the next time, and the security of the user account is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, are included to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it.
Further, throughout the drawings, the same or similar reference numerals denote the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
In the drawings:
fig. 1 is a schematic diagram of an application scenario of an e-commerce platform identity verification method according to some embodiments of the present application;
FIG. 2 is a flow diagram of a method for e-commerce platform identity verification according to one embodiment of the present application;
FIG. 3 is a flow diagram of a portion of the steps of a method for e-commerce platform identity verification according to one embodiment of the present application;
FIG. 4 is a block diagram of an e-commerce platform authentication device according to one embodiment of the present application;
FIG. 5 is a block diagram of an e-commerce platform authentication device according to one embodiment of the present application;
FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The meaning of the reference symbols in the figures:
100. an e-commerce system; 101. a user terminal; 102. e-commerce terminals; 103. a cloud terminal; 104. a security server;
200. a detection device; 201. a first receiving module; 202. a cloud terminal; 203. a first authentication module; 204. a data handset module; 205. a sending module; 206. a second receiving module; 207. a second authentication module;
800. an electronic device; 801. a processing device; 802. a ROM; 803. a RAM; 804. a bus; 805. an I/O interface; 806. an input device; 807. an output device; 808. a storage device; 809. a communication device.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
E-commerce platform identity verification method of embodiment
Referring to fig. 1, the e-commerce platform identity authentication method of the present application is performed by an e-commerce system 100 in fig. 1, where the e-commerce system 100 includes a plurality of user terminals 101, e-commerce terminals 102, cloud terminals 103, and a security server 104, where the user terminals 101, the e-commerce terminals 102, the cloud terminals 103, and the security server 104 may form data interaction based on wired communication or wireless communication.
The e-commerce terminal can be configured as a PC terminal, and can also be configured as other intelligent terminal devices such as a tablet computer, a mobile phone, and the like.
Referring to fig. 2-3, an e-commerce platform identity authentication method according to an embodiment of the present application includes the following steps:
preferably, the e-commerce terminal responds to the identity recognition operation of the user to acquire information sent by the user, receives user data, uploads the user data to the cloud terminal, reads the data of the cloud terminal, and compares the data with the user data through a database of the cloud terminal.
In some embodiments, the user can log in through the user terminal, connect to the e-commerce terminal, perform face or fingerprint identification through the user terminal, upload login data of the user, store the data by using the cloud terminal, and save a storage cost of the data.
Preferably, based on comparison between user data and cloud terminal data, meanwhile, identity credentials and application scenes of a user to be verified are predicted to be sent to the security server, the user data comprise login information, a login place and a network connected during login of the user, the security server detects user information security and login risk to evaluate, and the evaluation information is sent to the e-commerce terminal.
In the embodiment, the identity certificate of the user to be verified can be face image data or fingerprint data of the user to be verified, the face image data or the fingerprint data of the user to be verified are compared, corresponding preset characteristics are compounded, the user data comprise login information, login places and networks connected during login, the user is monitored when logging in the network, a dangerous program or a dangerous network is prevented from being connected with the user's login network, risk assessment is carried out on the user login places, whether a case of network intrusion happens or not is detected, then login risk assessment is carried out, and meanwhile the comparison result of the user information and cloud terminal data is transmitted.
Preferably, the e-commerce terminal receives the evaluation result to perform identity verification, when the identity verification passes, the user is allowed to perform login operation based on the identity verification information result, and meanwhile login information of the user and user data in the verification process are uploaded to the cloud terminal to obtain a login record.
After the user logs in the e-commerce terminal, login information of the user is collected, and if: the login time, the login location and the risk assessment during login are carried out, login data of a user are classified and packaged and uploaded to the cloud terminal, downloading comparison is carried out when login is carried out next time conveniently, data are selected when the login data are compared next time conveniently through classified packaging, and then the comparison speed is improved.
The E-commerce terminal enables a user to log in, and after user data are uploaded to the cloud terminal, data in the cloud terminal are added, so that data comparison can be conveniently carried out when the user logs in next time, the login speed of the user is improved, and the waiting time of the user is reduced.
Preferably, after the authentication fails, the authentication result is sent to the user according to the contact information, the user uses other login prevention to confirm the secondary information, the secondary authentication information is transmitted to the user terminal, and meanwhile, the security server receives a secondary authentication instruction.
Further, the user is prompted to use a secondary login opportunity, and if the user chooses to initiate the identity authentication again, secondary login operation can be executed. If the user chooses not to initiate the identity authentication again, the authentication is not carried out, the executable operation can prevent the user from comparing data and generating errors, so that the user can not log in, the security of the secondary identity authentication carried out by the security server is higher,
preferably, the security server sends the short message verification code or the voice verification code to the user terminal, and the user terminal receives the short message verification code or the voice verification code sent by the security server and inputs the received short message verification code or the received voice verification code into the e-commerce terminal.
The intelligent outbound call system is used for responding to the identity authentication operation of the user, acquiring the contact information of the user and the face image of the user, the e-commerce terminal sends the received user authentication data to the safety server, the safety server performs authentication, the authentication efficiency is improved, and the voice authentication initiates voice call to the user by using the intelligent outbound call system. And after the user connects the voice call, broadcasting an identity verification result to the E-commerce terminal.
Preferably, when the second login information passes, the user is allowed to perform login operation based on the second authentication information structure.
Further, after the user logs in, the e-commerce terminal uploads secondary authentication information and login information to the sub-cloud terminal and the security server, the cloud terminal records user registration records, and authentication results and personnel information in the authentication process are stored in a correlated mode to obtain the authentication records, wherein the personnel information comprises personal information of the user and personal information of service personnel, and the cloud terminal comparison efficiency is improved when the user logs in next time.
Preferably, when the second login information fails, the user is refused to login, and the login information of the user is uploaded to the security server.
And further, the security server marks the login as dangerous login information, compares the dangerous login information with the next login, and determines that the authentication result is failed when the authentication is performed. At this time, the image of the authenticated service person, the personal information of the user, the authentication result, the location, the time and other information can be stored in association with each other, so that an abnormal information record can be formed. If some users still suffer from loss, materials can be provided for relevant departments if necessary, and the resolution efficiency of dangerous logging is improved.
Referring to fig. 4-5, an e-commerce platform identity verification apparatus according to an embodiment of the present application includes: the cloud terminal is used for storing data of a user, searching comparison data of the user data in the cloud terminal, and obtaining an identity verification result based on the searching result. When a registered face image of a service staff is searched, an authentication result is passed, a first authentication module authenticates user data and comparison data, simultaneously authenticates an identity certificate and an application scene of a user, estimates identity inquiry information of the user to be authenticated, evaluates user information safety and login risk, judges whether the user logs in, a data collection module collects login data of the user, accumulates user data, improves the comparison time for logging in the following time, a sending module sends a short message authentication code to a user terminal, and initiates a voice call to the user through an intelligent outbound system, a second receiving module receives the user short message authentication code, and the identity authentication result is sent to the user in a voice notification mode, wherein the first authentication module comprises: and the second verification module verifies the short message verification code and the voice broadcast verification code, and broadcasts an identity verification result after the user connects the voice call. The accuracy of the user data is judged, a plurality of verification modes are adopted, the user can conveniently log in, and the personal information of the service personnel is obtained based on the identity verification result. And storing the authentication result in association with personnel information in the authentication process to obtain an authentication record, wherein the personnel information comprises the personal information of the user and the personal information of the service personnel.
As shown with reference to fig. 6, an electronic device 800 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 801 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage means 808 into a Random Access Memory (RAM) 803. In the RAM803, various programs and data necessary for the operation of the electronic apparatus 800 are also stored. The processing apparatus 801, the ROM802, and the RAM803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
Generally, the following devices may be connected to the I/O interface 805: input devices 806 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.: output devices 807 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage devices 808 including, for example, magnetic tape, hard disk, etc.: and a communication device 809. The communication means 809 may allow the electronic device 800 to communicate wirelessly or by wire with other devices to exchange data.
While fig. 6 illustrates an electronic device 800 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be alternatively implemented or provided.
Each block shown in fig. 6 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer storage medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through communications device 809, or installed from storage device 808, or installed from ROM 802. The computer program, when executed by the processing apparatus 801, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer storage media described above in some embodiments of the disclosure can be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer storage medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer storage medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (hypertext transfer protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer storage medium may be one contained in the electronic device: or may exist separately without being assembled into the electronic device. The computer storage medium carries one or more programs that, when executed by the electronic device, cause the electronic device to: the method comprises the steps of receiving login data in a user terminal, receiving data of various terminals of a mobile phone terminal and a computer terminal, and being wider in application range. The system comprises a data collection module, a second receiving module, a second verification module and a second receiving module, wherein the data collection module is used for collecting login data of a user, accumulating the user data and improving the comparison time for next login, the sending module is used for sending a short message verification code to a user terminal, voice communication is initiated to the user through an intelligent outbound system, the second receiving module is used for receiving the short message verification code of the user and receiving voice broadcast of the user, the second verification module is used for verifying the short message verification code and the voice broadcast verification code, the accuracy of the user data is judged, and multiple verification modes are used for facilitating login of the user.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and including the conventional procedural programming languages: such as the "C" language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures.
For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described elements may also be provided within a processor, and the names of the elements do not in some cases constitute limitations on the elements themselves.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.
Claims (10)
1. A method for verifying the identity of an e-commerce platform comprises the following steps:
the e-commerce terminal responds to the identity recognition operation of the user to acquire information sent by the user;
the user can log in through a user terminal, is connected with the e-commerce terminal, performs face or fingerprint identification through the user terminal, and uploads the login data of the user;
the E-commerce terminal receives the user data, uploads the user data to a cloud terminal, reads the data of the cloud terminal, and compares the data with the user data through a database of the cloud terminal;
the cloud terminal is used for storing data, and the data storage cost is saved.
2. The method for e-commerce platform identity verification of claim 1, wherein:
based on the comparison between the user data and the cloud terminal data, and meanwhile, the identity certificate and the application scene of the user to be verified are predicted, and the identity query information of the user to be verified is sent to a security server;
the user data comprises login information, a login place and a network connected during login of the user;
the security server detects the security of the user information and the login risk for evaluation, and sends evaluation information to the e-commerce terminal;
the security server detects the comparison result of the user information and the cloud terminal data, evaluates the user login place and the connected network, and prevents the user from stealing the number and the like through the same network;
and the E-commerce terminal receives the evaluation result and carries out identity verification.
3. The method for e-commerce platform identity verification of claim 2, wherein:
when the identity authentication passes, allowing the user to perform login operation based on the identity authentication information result;
meanwhile, login information of the user and user data in the verification process are uploaded to the cloud terminal, and login records are obtained;
the E-commerce terminal enables a user to log in, and after user data are uploaded to the cloud terminal, the data in the cloud terminal are added, so that data comparison is conveniently performed when the user logs in next time, the login speed of the user is improved, and the waiting time of the user is reduced.
4. The method for e-commerce platform identity verification of claim 2, wherein:
after the identity authentication is not passed, the user uses other login prevention to confirm the secondary information;
the security server receives a secondary identity verification instruction;
increasing the opportunity of secondary login, and preventing the user from comparing data to generate errors to cause that the user cannot log in;
the security of the secondary authentication performed by the security server is higher.
5. The method for e-commerce platform identity verification of claim 1, wherein:
the safety server sends a short message verification code or a voice verification code to a user terminal, and the user terminal receives the short message verification code or the voice verification code sent by the safety server and inputs the received short message verification code or the received voice verification code into the E-commerce terminal;
the e-commerce terminal sends the received user verification data to the security server, and the security server performs verification, so that the verification efficiency is improved;
the voice verification initiates a voice call to the user by using an intelligent outbound system;
and after the user connects the voice call, broadcasting the identity authentication result to the E-commerce terminal.
6. The method for e-commerce platform identity verification of claim 1, wherein:
when the secondary login information passes, allowing the user to perform login operation based on the secondary identity authentication information structure;
after the user logs in, the e-commerce terminal uploads the secondary identity authentication information and the login information to the cloud terminal and the security server, the cloud terminal records user registration records, and the cloud terminal comparison efficiency is improved when the user logs in next time.
7. The method for e-commerce platform identity verification of claim 1, wherein:
when the secondary login information does not pass, the user is refused to login, and the user login information is uploaded to the security server;
the security server marks the login as dangerous login information, and compares the dangerous login information with the next login, so that the distinguishing efficiency of dangerous login is improved.
8. An apparatus for e-commerce platform identity verification, comprising:
the first receiving module is used for receiving login data in the user terminal, receiving data of various terminals such as a mobile phone terminal and a computer terminal, and having a wider application range;
the cloud terminal is used for storing user data and searching comparison data of the user data in the cloud terminal;
the first verification module is used for verifying the user data and the comparison data, verifying the identity certificate and the application scene of the user, predicting the identity inquiry information of the user to be verified, evaluating the safety and the login risk of the user information and judging whether the user logs in;
the data collection module is used for collecting login data of a user, accumulating the user data and improving the comparison time for the next login;
the sending module sends a short message verification code to the user terminal and initiates a voice call to the user through the intelligent outbound system;
the second receiving module is used for receiving the short message verification code of the user and receiving the voice broadcast of the user;
the second verification module is used for verifying the short message verification code and the voice broadcast verification code and judging the accuracy of user data, and the user login is facilitated through multiple verification modes.
9. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the processors to perform the method recited in any of claims 1-7.
10. A computer storage medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the method of any of claims 1 to 7.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2021112545343 | 2021-10-27 | ||
CN202111254534 | 2021-10-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114915439A true CN114915439A (en) | 2022-08-16 |
Family
ID=82762650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111588597.2A Pending CN114915439A (en) | 2021-10-27 | 2021-12-23 | E-commerce platform identity verification method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114915439A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115271766A (en) * | 2022-09-20 | 2022-11-01 | 湖南三湘银行股份有限公司 | Mortgage surface sign on-line processing method and system based on remote video |
CN116192539A (en) * | 2023-04-28 | 2023-05-30 | 北京轻松筹信息技术有限公司 | Method, device, equipment and storage medium for merging data after user login |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140250516A1 (en) * | 2011-06-30 | 2014-09-04 | Dongxuan Gao | Method for authenticating identity of handset user |
CN106101135A (en) * | 2016-07-22 | 2016-11-09 | 福州大学 | A kind of account login system based on face and fingerprint recognition and its implementation |
CN106504745A (en) * | 2016-11-11 | 2017-03-15 | 广州市讯飞樽鸿信息技术有限公司 | A kind of speech verification code system and its implementation method |
CN206877332U (en) * | 2017-07-20 | 2018-01-12 | 付毅铭 | A kind of intelligent protection module of information safety devices |
CN109359548A (en) * | 2018-09-19 | 2019-02-19 | 深圳市商汤科技有限公司 | Plurality of human faces identifies monitoring method and device, electronic equipment and storage medium |
CN112615828A (en) * | 2020-12-08 | 2021-04-06 | 浙江启博知识产权运营有限公司 | Intellectual property operating system based on cloud computing network and intelligent authorization method |
CN113497807A (en) * | 2021-07-09 | 2021-10-12 | 深圳竹云科技有限公司 | Method and device for detecting user login risk and computer readable storage medium |
-
2021
- 2021-12-23 CN CN202111588597.2A patent/CN114915439A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140250516A1 (en) * | 2011-06-30 | 2014-09-04 | Dongxuan Gao | Method for authenticating identity of handset user |
CN106101135A (en) * | 2016-07-22 | 2016-11-09 | 福州大学 | A kind of account login system based on face and fingerprint recognition and its implementation |
CN106504745A (en) * | 2016-11-11 | 2017-03-15 | 广州市讯飞樽鸿信息技术有限公司 | A kind of speech verification code system and its implementation method |
CN206877332U (en) * | 2017-07-20 | 2018-01-12 | 付毅铭 | A kind of intelligent protection module of information safety devices |
CN109359548A (en) * | 2018-09-19 | 2019-02-19 | 深圳市商汤科技有限公司 | Plurality of human faces identifies monitoring method and device, electronic equipment and storage medium |
CN112615828A (en) * | 2020-12-08 | 2021-04-06 | 浙江启博知识产权运营有限公司 | Intellectual property operating system based on cloud computing network and intelligent authorization method |
CN113497807A (en) * | 2021-07-09 | 2021-10-12 | 深圳竹云科技有限公司 | Method and device for detecting user login risk and computer readable storage medium |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115271766A (en) * | 2022-09-20 | 2022-11-01 | 湖南三湘银行股份有限公司 | Mortgage surface sign on-line processing method and system based on remote video |
CN115271766B (en) * | 2022-09-20 | 2023-01-10 | 湖南三湘银行股份有限公司 | Mortgage surface sign on-line processing method and system based on remote video |
CN116192539A (en) * | 2023-04-28 | 2023-05-30 | 北京轻松筹信息技术有限公司 | Method, device, equipment and storage medium for merging data after user login |
CN116192539B (en) * | 2023-04-28 | 2023-08-08 | 北京轻松筹信息技术有限公司 | Method, device, equipment and storage medium for merging data after user login |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11842803B2 (en) | Strong authentication via distributed stations | |
CN112055024B (en) | Authority verification method and device, storage medium and electronic equipment | |
US8904480B2 (en) | Social authentication of users | |
US10798106B2 (en) | System for providing layered security | |
US9166965B2 (en) | Method and system for automated user authentication for a priority communication session | |
US20120089675A1 (en) | Systems and methods for user interaction based on license or other identification information | |
CN114036216A (en) | Data processing method, device and storage medium | |
US11568034B2 (en) | Managing access based on activities of entities | |
CN104751032A (en) | Authentication method and authentication device | |
CN104519490A (en) | WIFI (wireless fidelity) connection method, WIFI connection device, mobile terminal and system | |
CN114915439A (en) | E-commerce platform identity verification method and device, electronic equipment and storage medium | |
CN105657781B (en) | WiFi network access method and device | |
CN107454040B (en) | Application login method and device | |
CN104333530A (en) | Information credibility verifying method and apparatus | |
US11924636B2 (en) | System and method for authenticating using a multi-provider platform | |
JP6122924B2 (en) | Providing device, terminal device, providing method, providing program, and authentication processing system | |
US20230308881A1 (en) | System and method for encounter identity verification | |
CN103973652A (en) | Login method and login system | |
US20230216850A1 (en) | Remotely Accessing an Endpoint Device Using a Distributed Systems Architecture | |
CN115840399A (en) | Intelligent building monitoring system based on Internet of things and monitoring method thereof | |
CN115730324A (en) | Business system access method and device, storage medium and electronic equipment | |
US20230239403A1 (en) | Systems and methods for integrated third-party callbacks | |
CN111355750B (en) | Method and device for recognizing brute force password cracking behavior | |
JP6240349B2 (en) | Providing device, providing method, providing program, and authentication processing system | |
CN118891619A (en) | Authentication interaction system and method based on blockchain and digital identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |