Movatterモバイル変換


[0]ホーム

URL:


CN111010395A - Credit-based information identification generation method and device - Google Patents

Credit-based information identification generation method and device
Download PDF

Info

Publication number
CN111010395A
CN111010395ACN201911302862.9ACN201911302862ACN111010395ACN 111010395 ACN111010395 ACN 111010395ACN 201911302862 ACN201911302862 ACN 201911302862ACN 111010395 ACN111010395 ACN 111010395A
Authority
CN
China
Prior art keywords
user
information
identity information
identifier
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911302862.9A
Other languages
Chinese (zh)
Other versions
CN111010395B (en
Inventor
卢成炳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co LtdfiledCriticalAlipay Hangzhou Information Technology Co Ltd
Priority to CN202111316346.9ApriorityCriticalpatent/CN113949585A/en
Priority to CN201911302862.9Aprioritypatent/CN111010395B/en
Publication of CN111010395ApublicationCriticalpatent/CN111010395A/en
Application grantedgrantedCritical
Publication of CN111010395BpublicationCriticalpatent/CN111010395B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The embodiment of the specification provides a credit-based information identifier generation method and a credit-based information identifier generation device, wherein the method is applied to a server and comprises the following steps: receiving user identity information sent by a client; verifying the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user, and returning the credibility value to the client; receiving an information identifier generation request of the user sent by the client; and under the condition that the reliability value is greater than or equal to a preset threshold value, generating an information identifier in a preset format from the identity information of the user according to the information identifier generation request of the user, and sending the information identifier to the client.

Description

Credit-based information identifier generation method and device
Technical Field
The embodiment of the specification relates to the technical field of computers, in particular to two information identifier generation methods based on credit and two information acquisition methods based on information identifiers. One or more embodiments of the present specification relate to two credit-based information identifier generating apparatuses, two information identifier-based information acquiring apparatuses, two computing devices, and two computer-readable storage media.
Background
The name, the affiliated organization, the company unit, the occupation, the job and the contact way of the traditional user name card are generally marked, the cost of the name card is low, the opportunity is created for lawbreakers, and a lot of lawbreakers can utilize a large number of false name cards to perform fraud and the like.
With the improvement of the anti-cheating consciousness of people, the business cards received by people in public places are generally considered as false business cards, the trust degree of the business cards in the mind of people is greatly reduced, people almost discard the business cards in the next second after receiving the business cards, and the business cards are difficult to be used for trading business.
Disclosure of Invention
In view of this, the embodiments of the present disclosure provide two methods for generating information identifier based on credit and two methods for acquiring information based on information identifier. One or more embodiments of the present specification relate to two credit-based information identifier generating apparatuses, two information identifier-based information acquiring apparatuses, two computing devices, and two computer-readable storage media.
According to a first aspect of the embodiments of the present specification, there is provided a credit-based information identifier generation method, applied to a server, including:
receiving user identity information sent by a client;
verifying the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user, and returning the credibility value to the client;
receiving an information identifier generation request of the user sent by the client;
and under the condition that the reliability value is greater than or equal to a preset threshold value, generating an information identifier in a preset format from the identity information of the user according to the information identifier generation request of the user, and sending the information identifier to the client.
Optionally, verifying the identity information of the user based on a preset verification mode includes:
acquiring personal history information of the user;
and under the condition that the personal history information meets a verification condition, verifying the identity information of the user based on the preset verification mode and the personal history information.
Optionally, after obtaining the personal history information of the user, the method further includes:
and under the condition that the personal historical information does not meet the verification condition, acquiring the personal platform information of the user on a third-party platform based on the third-party platform associated with the user, and verifying the identity information of the user based on the preset verification mode and the personal platform information.
Optionally, the generating, according to the information identifier generation request of the user, an information identifier in a preset format of the identity information of the user includes:
and generating a request according to the information identifier of the user to determine the identity information of the user corresponding to the user, and configuring the unique information identifier with a preset format for the identity information of the user.
Optionally, after the generating a request according to the information identifier of the user to determine the identity information of the user corresponding to the user and configuring the unique information identifier with a preset format for the identity information of the user, the method further includes:
and generating a form based on the identity information of the user and the information identifier corresponding to the identity information of the user, and storing the form in the server.
Optionally, the method further includes:
receiving an acquisition request sent by a client for verifying the identity information of a user, wherein the acquisition request carries an information identifier of the user;
determining identity information of the user corresponding to the information identifier and a credibility value of the identity information of the user based on the information identifier;
and returning the identity information of the user and the credibility value of the identity information of the user to the client.
Optionally, the determining, based on the information identifier, the identity information of the user corresponding to the information identifier and the confidence value of the identity information of the user includes:
searching the form corresponding to the information identifier based on the information identifier;
and determining the identity information of the user and the credibility value of the identity information of the user corresponding to the information identifier based on the form and the information identifier.
According to a second aspect of the embodiments of the present specification, there is provided a credit-based information identifier generation method, applied to a client, including:
receiving user identity information uploaded by a user, and sending the user identity information to a server;
receiving the identity information of the user verified by the server based on a preset verification mode to obtain a credibility value of the identity information of the user, and sending the credibility value to the user;
receiving an information identifier generation request of the user, and sending the information identifier generation request of the user to a server;
and receiving an information identifier in a preset format generated by the identity information of the user according to the information identifier generation request of the user and sent by the server side under the condition that the reliability value is greater than or equal to a preset threshold value, and sending the information identifier to the user.
Optionally, the method further includes:
receiving an identity information acquisition request aiming at a user and sent by a verification user, wherein the acquisition request carries an information identifier of the user;
sending the acquisition request to a server, and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are returned by the server;
and returning the identity information of the user and the credibility value of the identity information of the user to the verified user.
According to a third aspect of the embodiments of the present specification, there is provided an information obtaining method based on information identification, applied to a client, including:
receiving an identity information acquisition request aiming at a user and sent by a verification user, wherein the acquisition request carries an information identifier of the user;
sending the acquisition request to a server, and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned by the server;
and returning the identity information of the user and the credibility value of the identity information of the user to the verified user.
Optionally, after receiving the identity information obtaining request for the user sent by the verification user, the method further includes:
and determining a verification code input page based on the acquisition request, and returning the verification code input page to the verification user.
Optionally, after returning the verification code input page to the verification user, the method further includes:
and receiving a verification code input by the verification user based on the verification code input page, and sending the verification code to the server.
Optionally, the receiving, by the server, the identity information of the user and the confidence value of the identity information of the user, which are determined based on the information identifier and correspond to the information identifier, includes:
and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned under the condition that the verification code meets the verification condition determined by the server.
Optionally, the receiving the verification code input by the verification user based on the verification code input page includes:
receiving the verification code acquisition request sent by the user, and sending the verification code acquisition request to the server;
receiving a verification code determined by the server based on the verification code acquisition request, and sending the verification code to the user;
and receiving the verification code which is obtained by the verification user based on the user and is input based on the verification code input page.
Optionally, the step of the verification code satisfying the verification condition includes:
and the verification code input by the verification user based on the verification code input page is the same as the verification code obtained by the verification user based on the user.
According to a fourth aspect of the embodiments of the present specification, there is provided an information obtaining method based on information identifier, applied to a server, including:
receiving an acquisition request sent by a client for verifying the identity information of a user, wherein the acquisition request carries an information identifier of the user;
determining identity information of the user corresponding to the information identifier and a credibility value of the identity information of the user based on the information identifier;
and returning the identity information of the user and the credibility value of the identity information of the user to the client.
Optionally, after receiving the request for acquiring the identity information of the user by the verification user sent by the client, the method further includes:
and receiving the verification code which is sent by the client and is input by the verification user based on the verification code input page.
Optionally, the determining, based on the information identifier, the identity information of the user corresponding to the information identifier and the confidence value of the identity information of the user includes:
and under the condition that the verification code meets verification conditions, determining the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user based on the information identifier.
Optionally, after receiving the request for acquiring the identity information of the user by the verification user sent by the client, the method further includes:
receiving a verification code acquisition request of a user sent by the client;
and determining a verification code based on the verification code acquisition request, and returning the verification code to the user.
Optionally, the step of the verification code satisfying the verification condition includes:
and the verification code input by the verification user based on the verification code input page is the same as the verification code acquired by the user based on the verification code acquisition request.
According to a fifth aspect of the embodiments of the present specification, there is provided a credit-based information identifier generating apparatus, applied to a server, including:
the first receiving module is configured to receive the identity information of the user sent by the client;
the first verification module is configured to verify the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user and return the credibility value to the client;
the second receiving module is configured to receive the information identifier generation request of the user sent by the client;
the first generation module is configured to generate an information identifier in a preset format from the identity information of the user according to the information identifier generation request of the user and send the information identifier to the client under the condition that the reliability value is greater than or equal to a preset threshold value.
According to a sixth aspect of the embodiments of the present specification, there is provided a credit-based information identifier generation apparatus, applied to a client, including:
the third receiving module is configured to receive the identity information of the user uploaded by the user and send the identity information of the user to the server;
the fourth receiving module is configured to receive the identity information of the user verified by the server based on a preset verification mode to obtain a reliability value of the identity information of the user, and send the reliability value to the user;
a fifth receiving module, configured to receive the information identifier generation request of the user, and send the information identifier generation request of the user to a server;
a sixth receiving module, configured to receive, when the reliability value is greater than or equal to a preset threshold value, an information identifier in a preset format, which is generated by the identity information of the user according to the information identifier generation request of the user, sent by the server, and send the information identifier to the user.
According to a seventh aspect of the embodiments of the present specification, there is provided an information acquisition apparatus based on information identification, applied to a client, including:
a seventh receiving module, configured to receive an identity information acquisition request for a user sent by a verified user, where the acquisition request carries an information identifier of the user;
the first sending module is configured to send the obtaining request to a server and receive identity information of the user corresponding to the information identifier and a credibility value of the identity information of the user, which are determined based on the information identifier and returned by the server;
a first return module configured to return the identity information of the user and the trustworthiness value of the identity information of the user to the verified user.
According to an eighth aspect of the embodiments of the present specification, there is provided an information acquisition apparatus based on information identifier, applied to a server, including:
an eighth receiving module, configured to receive an acquisition request for verifying identity information of a user, where the acquisition request carries an information identifier of the user, where the acquisition request is sent by a client;
a first determination module configured to determine identity information of the user corresponding to the information identifier and a confidence value of the identity information of the user based on the information identifier;
a second return module configured to return the identity information of the user and the trustworthiness value of the identity information of the user to the client.
According to a ninth aspect of embodiments herein, there is provided a computing device comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving user identity information sent by a client;
verifying the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user, and returning the credibility value to the client;
receiving an information identifier generation request of the user sent by the client;
and under the condition that the reliability value is greater than or equal to a preset threshold value, generating an information identifier in a preset format from the identity information of the user according to the information identifier generation request of the user, and sending the information identifier to the client.
According to a tenth aspect of embodiments herein, there is provided a computing device comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving user identity information uploaded by a user, and sending the user identity information to a server;
receiving the identity information of the user verified by the server based on a preset verification mode to obtain a credibility value of the identity information of the user, and sending the credibility value to the user;
receiving an information identifier generation request of the user, and sending the information identifier generation request of the user to a server;
and receiving an information identifier in a preset format generated by the identity information of the user according to the information identifier generation request of the user and sent by the server side under the condition that the reliability value is greater than or equal to a preset threshold value, and sending the information identifier to the user.
According to an eleventh aspect of embodiments herein, there is provided a computing device comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving an identity information acquisition request aiming at a user and sent by a verification user, wherein the acquisition request carries an information identifier of the user;
sending the acquisition request to a server, and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned by the server;
and returning the identity information of the user and the credibility value of the identity information of the user to the verified user.
According to a twelfth aspect of embodiments of the present specification, there is provided a computing device comprising:
a memory and a processor;
the memory is to store computer-executable instructions, and the processor is to execute the computer-executable instructions to:
receiving an acquisition request sent by a client for verifying the identity information of a user, wherein the acquisition request carries an information identifier of the user;
determining identity information of the user corresponding to the information identifier and a credibility value of the identity information of the user based on the information identifier;
and returning the identity information of the user and the credibility value of the identity information of the user to the client.
According to a thirteenth aspect of embodiments herein, there is provided a computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the credit-based information token generation method or the steps of the credit-based information token generation method.
According to a fourteenth aspect of the embodiments of the present specification, there is provided a computer-readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the information identification-based information acquisition method or the steps of the information identification-based information acquisition method.
An embodiment of the present specification provides a credit-based information identifier generation method, which is applied to a server and includes: receiving user identity information sent by a client; verifying the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user, and returning the credibility value to the client; receiving an information identifier generation request of the user sent by the client; under the condition that the credibility value is greater than or equal to a preset threshold value, generating an information identifier in a preset format from the identity information of the user according to an information identifier generation request of the user, and sending the information identifier to the client;
after receiving the user identity information sent by the client, the credit-based information identifier generation method verifies the identity information of the user based on a preset verification mode, verifies the credibility of the user identity information, then generates the information identifier with a preset format from the user identity information with higher credibility according to the requirements of the user, and ensures the credibility value of the generated information identifier by obtaining the credibility degree through verifying the identity information of the user, so that when the user uses the information identifier to carry out business transaction, the credibility of the opposite party of business transaction to the acquired corresponding user information through the information identifier is improved, and the business transaction rate of business transaction through the information identifier is greatly improved.
Drawings
Fig. 1 is a flowchart of a credit-based information identifier generation method applied to a server according to an embodiment of the present specification;
fig. 2 is a flowchart of a credit-based information identifier generation method applied to a client according to an embodiment of the present specification;
fig. 3 is a flowchart of interaction among a user, an authenticated user, a server, and a client when the method for generating a credit-based information identifier is applied to a credit platform in a case that the identity information of the user is professional information of the user according to an embodiment of the present specification;
fig. 4 is a flowchart of interaction among a user, a third-party platform, an authenticated user, a server, and a client when the method for generating a credit-based information identifier is applied to a credit platform in a case that the identity information of the user is professional information of the user according to an embodiment of the present specification;
fig. 5 is a flowchart of an information obtaining method applied to a client based on information identification according to an embodiment of the present specification;
fig. 6 is a flowchart of an information obtaining method based on information identification applied to a server according to an embodiment of the present specification;
fig. 7 is a flowchart illustrating interaction among a user, a server, and a client when the information obtaining method based on information identifier is applied to a credit platform in a case that the identity information of the user is professional information according to an embodiment of the present specification;
fig. 8 is a schematic structural diagram of a credit-based information identifier generating apparatus according to an embodiment of the present specification;
fig. 9 is a schematic structural diagram of another credit-based information identifier generating apparatus provided in an embodiment of the present specification;
fig. 10 is a schematic structural diagram of an information acquisition apparatus based on information identification according to an embodiment of the present specification;
fig. 11 is a schematic structural diagram of another information acquisition apparatus based on information identification according to an embodiment of the present specification;
FIG. 12 is a block diagram of a computing device, according to one embodiment of the present description;
FIG. 13 is a block diagram of another computing device provided in one embodiment of the present description.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present description. This description may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, as those skilled in the art will be able to make and use the present disclosure without departing from the spirit and scope of the present disclosure.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present specification refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first can also be referred to as a second and, similarly, a second can also be referred to as a first without departing from the scope of one or more embodiments of the present description. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In the present specification, two credit-based information identifier generation methods and two information identifier-based information acquisition methods are provided. One or more embodiments of the present specification relate to two types of information identifier generation apparatuses based on credit, two types of information acquisition apparatuses based on information identifiers, two types of computing devices, and two types of computer-readable storage media, which are described in detail one by one in the following embodiments.
In the prior art, the traditional paper business card is low in manufacturing cost, a plurality of fraud companies can print a large number of false business cards for fraud, the trust level of the business cards in people is lower and lower, and therefore the regular enterprises can use business card expansion business to cause troubles.
Referring to fig. 1, fig. 1 shows a flowchart of a credit-based information identifier generation method provided in an embodiment of the present specification, which is applied to a server and includessteps 102 to 108.
Step 102: and receiving the identity information of the user sent by the client.
The identity information of the user includes, but is not limited to, professional information of the user, parent information of the user, child information of the user, communication information of the user, and the like. The description is given by taking the identity information of the user as the professional information of the user as an example, and the identity information of the user may be the name of the user, the contact information of the user, the name of the affiliated work unit, the position of the affiliated work unit, the address of the affiliated work unit, the contact information of the work unit, and the like.
For convenience of understanding, in the following embodiments of the specification, the identity information of the user is taken as the professional information of the user, for example, the name of the user, the contact address of the user, the name of the affiliated work unit, the position of the affiliated work unit, the address of the affiliated work unit, the contact address of the work unit, and the like.
Step 104: and verifying the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user, and returning the credibility value to the client.
The preset verification mode includes but is not limited to a verification mode using internet big data or a verification mode using an artificial intelligence technology.
In one or more embodiments of the present specification, the verifying the identity information of the user based on a preset verification manner includes:
acquiring personal history information of the user;
and under the condition that the personal history information meets a verification condition, verifying the identity information of the user based on the preset verification mode and the personal history information.
In particular, the personal history information of the user includes, but is not limited to, personal historical shopping information, personal historical website browsing information, personal historical transfer information, and the like of the user.
In practical applications, the verification condition may include, but is not limited to, obtaining personal history information of the user authorized by the user or obtaining personal history information of a preset number and preset required content, for example, the preset number is 3, and the preset required content includes personal historical shopping information of the user and personal historical transfer information of the user.
For example, if the verification condition is to acquire personal history information of 3 users, and at this time, the user is a newly registered user and no personal history information exists, then acquiring the personal history information of the user is null, and then the acquired personal history information of the user cannot satisfy the verification condition; if the verification condition is that 1 piece of personal historical shopping information of the user and 1 piece of personal historical transfer information of the user are acquired, the user is a registered user at the moment, 3 pieces of personal historical shopping information of the user and 5 pieces of personal historical transfer information of the user can be acquired, and then the acquired personal historical information of the user meets the verification condition.
In practical application, verifying the identity information of the user based on the preset verification mode and the personal history information can be understood as verifying the identity information of the user based on a verification mode utilizing internet big data or a verification mode implemented by utilizing an artificial intelligence technology means and the like in combination with the acquired personal history information of the user, for example, the acquired personal history information of the user includes transfer information of the user, the transfer information of the user includes a real name of the user, and then the verification mode utilizing the internet big data can be used in combination with the acquired real name of the user in the transfer information of the user to verify the name of the user in the identity information of the user; specifically, other information in the user identity information sent by the client may also be verified in this way to obtain a prediction of the reliability value of the user identity information, for example, when the user identity information is professional information of the user, when the name of the user is true, the reliability value of the user identity information is 10%, when the contact manner of the user is true, the reliability value of the user identity information is increased to 15%, and the like, which is not described herein again.
In the embodiment of the present specification, when the obtained personal history information of the user meets the verification condition, the identity information of the user is verified based on the preset verification mode and the personal history information, so that when the obtained personal history information of the user has sufficient data, a more accurate confidence value of the identity information of the user can be obtained when the identity information of the user is verified based on the preset verification mode and the personal history information.
In one or more embodiments of the present specification, after acquiring the personal history information of the user, the method further includes:
and under the condition that the personal historical information does not meet the verification condition, acquiring the personal platform information of the user on a third-party platform based on the third-party platform associated with the user, and verifying the identity information of the user based on the preset verification mode and the personal platform information.
The cases where the personal history information does not satisfy the verification condition include, but are not limited to, the number of the personal history information does not reach the number of the personal history information specified by the verification condition, the content of the personal history information does not satisfy the content of the personal history information specified by the verification condition, and the like. Taking the above as an example, for example, if the user is a new registered user, the number and the content of the acquired personal history information of the user are both zero, or important personal history information that is not authorized by the user cannot be acquired, and the identity information of the user cannot be verified according to the preset verification manner and the acquired personal history information.
Specifically, under the condition that the acquired personal history information of the user does not meet a verification condition, acquiring personal platform information of the user on a third-party platform based on the third-party platform associated with the user, and verifying the identity information of the user based on the preset verification mode and the personal platform information; in practical application, the third-party platform associated with the user may be an affiliated entity or organization of the user.
Taking the third-party platform associated with the user as an example of the affiliated unit of the user, the personal platform information of the user on the third-party platform is acquired based on the third-party platform associated with the user, and the personal platform information includes, but is not limited to, the name and professional information of the affiliated unit of the user.
In practical application, the third-party platform associated with the user is associated with the server, and when the personal history information of the user acquired by the server does not meet the verification condition, the third-party platform associated with the user acquires the personal platform information of the user on the third-party platform as a supplement, so as to ensure that the identity information of the user can be verified based on the preset verification mode and the personal platform information under the condition that the personal history information does not meet the verification condition, avoid interruption of a subsequent processing flow under the condition that the personal history information of the user cannot meet the verification condition, and improve the stability of the information identifier generation method based on credit.
Step 106: and receiving an information identifier generation request of the user sent by the client.
Specifically, the identity information of the user is verified based on a preset verification mode to obtain a reliability value of the identity information of the user, and after the reliability value is returned to the client, an information identifier generation request of the user sent by the client is received.
The information identifier generation request of the user may be any one of voice, text, or other request modes, and is not limited herein.
Step 108: and under the condition that the reliability value is greater than or equal to a preset threshold value, generating an information identifier in a preset format from the identity information of the user according to the information identifier generation request of the user, and sending the information identifier to the client.
The preset threshold is set according to a specific application, and this application is not limited in any way, for example, the preset threshold may be set to 60% or 80%.
Specifically, after receiving the user information identifier generation request sent by the client, it is first determined whether the reliability value of the user identity information obtained by verification is greater than or equal to a preset threshold value, if so, the user identity information is generated into an information identifier in a preset format according to the user information identifier generation request, and the information identifier is sent to the client; if not, determining that the credibility value of the identity information of the user is smaller, and the credibility of the identity information of the user is low, so that a request is not generated according to the information identifier of the user for subsequent processing, an invalid working process is avoided, and the working efficiency is increased.
In specific implementation, the information identifier in the preset format may be understood as a unique identifier in the preset format that can represent the identity information of the user, for example, an identifier of a two-dimensional code representing the identity information of the user or a unique pattern identifier customized for the identity information of each user, and the identity information of the user, for example, the professional information of the user, may be uniquely determined by the information identifier in the preset format: the name of the user, the contact information of the user, the name of the affiliated work unit, the position of the affiliated work unit, the address of the affiliated work unit and the contact information of the work unit.
In one or more embodiments of the present specification, the generating, according to the information identifier generation request of the user, an information identifier in a preset format of the identity information of the user includes:
and generating a request according to the information identifier of the user to determine the identity information of the user corresponding to the user, and configuring the unique information identifier with a preset format for the identity information of the user.
Specifically, the identity information of the user corresponding to the user is determined according to the information identifier generation request of the user, and the unique information identifier in the preset format is configured for the identity information of the user, so that the identity information of the user passing the verification can be traced back to the identity information of the user passing the verification based on the unique information identifier in the preset format of the server side, and the trust degree of the user is increased.
The credit-based credit identification generation method provided by the embodiment of the specification is applied to a credit platform server, after receiving user identity information sent by a client, a credit platform is used as a third-party authentication mechanism to authenticate the user identity information at the server so as to obtain a credibility value of the user identity information, after receiving a user information identification generation request sent by the client, the identity information of the user with the credibility value meeting a preset threshold is generated into identification information in a preset format, the credit platform is used as a third-party guarantee platform for the accuracy of the user identity information, and the subsequent credibility for obtaining the corresponding user identity information through the identification information in the preset format is greatly increased.
In one or more embodiments of this specification, after the determining, according to the information identifier generation request of the user, the identity information of the user corresponding to the user, and configuring an information identifier in a unique preset format for the identity information of the user, the method further includes:
and generating a form based on the identity information of the user and the information identifier corresponding to the identity information of the user, and storing the form in the server.
In practical applications, the form may record the identity information of the user and the unique identification code of the information identifier, for example, the information identifier is a two-dimensional code picture, and then the form may record the identity information of the user and the unique identification code of the two-dimensional code picture corresponding to the identity information.
Specifically, a form is generated based on the identity information of the user and an information identifier corresponding to the identity information of the user, and the form is stored in the server, so that the identity information of the corresponding user can be conveniently found based on the information identifier.
In one or more embodiments of this specification, when the confidence value is greater than or equal to a preset threshold, after generating, according to an information identifier generation request of the user, an information identifier in a preset format from the identity information of the user, and sending the information identifier to the client, the method further includes:
receiving an acquisition request sent by a client for verifying the identity information of a user, wherein the acquisition request carries an information identifier of the user;
determining identity information of the user corresponding to the information identifier and a credibility value of the identity information of the user based on the information identifier;
and returning the identity information of the user and the credibility value of the identity information of the user to the client.
Specifically, the determining, based on the information identifier, the identity information of the user corresponding to the information identifier and the reliability value of the identity information of the user includes:
searching the form corresponding to the information identifier based on the information identifier;
and determining the identity information of the user and the credibility value of the identity information of the user corresponding to the information identifier based on the form and the information identifier.
In specific implementation, after a form is generated based on the identity information of the user and an information identifier corresponding to the identity information of the user and is stored in the server, an information identifier of the identity information of the user, which is carried in an acquisition request for verifying the identity information of the user sent by a client, is received, then the form corresponding to the information identifier is searched based on the information identifier, then the identity information of the user and the reliability value of the identity information of the user, which correspond to the information identifier, are searched in the form, and finally the identity information of the user and the reliability value of the identity information of the user are returned to the client.
In this embodiment of the present specification, after generating a corresponding information identifier for the identity information of a user, an obtaining request for verifying the identity information of the user sent by a client may be received, the identity information of the user and the reliability value of the identity information of the user, which correspond to the information identifier, are determined based on the information identifier of the user carried in the obtaining request, and finally the identity information of the user and the reliability value of the identity information of the user are returned to the client, so that the verifying user may obtain the identity information of the user, which corresponds to the information identifier and has a certain reliability, through a credit platform, the credit platform is used as a third-party guarantee mechanism for the accuracy of the identity information of the user, the trust degree of the verification user on the acquired identity information of the user is increased, and the transaction rate of completing the service by using the identity information of the user is increased.
Referring to fig. 2, fig. 2 is a flowchart illustrating a credit-based information identifier generation method applied to a client according to an embodiment of the present disclosure, includingsteps 202 to 208.
Step 202: and receiving the identity information of the user uploaded by the user, and sending the identity information of the user to a server.
Step 204: and receiving the identity information of the user verified by the server based on a preset verification mode to obtain the credibility value of the identity information of the user, and sending the credibility value to the user.
Step 206: and receiving an information identifier generation request of the user, and sending the information identifier generation request of the user to a server.
Step 208: and receiving an information identifier in a preset format generated by the identity information of the user according to the information identifier generation request of the user and sent by the server side under the condition that the reliability value is greater than or equal to a preset threshold value, and sending the information identifier to the user.
Specifically, the identity information of the user uploaded by the user and the identity information of the user verified by the server based on a preset verification mode to obtain a reliability value of the identity information of the user and the information identifier of the preset format generated by the identity information of the user according to the information identifier generation request of the user when the reliability value is greater than or equal to a preset threshold value and sent by the server may be referred to the above embodiments, and details are not repeated here.
The method for generating the information identifier based on the credit provided by the embodiment of the specification is applied to a client of a credit platform, and mainly comprises the steps of transmitting user identity information uploaded by a user through the client to a server, receiving a processing result of the uploaded user identity information by the server, and transmitting the processing result to the user, so that the effect of starting and starting is achieved.
In one or more embodiments of the present specification, receiving, when the reliability value is greater than or equal to a preset threshold value, an information identifier in a preset format, which is generated by the identity information of the user according to the information identifier generation request of the user and is sent to the user, sent by the server, further includes:
receiving an identity information acquisition request aiming at a user and sent by a verification user, wherein the acquisition request carries an information identifier of the user;
sending the acquisition request to a server, and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are returned by the server;
and returning the identity information of the user and the credibility value of the identity information of the user to the verified user.
In the embodiment of the specification, a credit platform client, after receiving an information identifier in a preset format generated by a request generated according to an information identifier of a user and sending the information identifier to the user when the reliability value sent by the server is greater than or equal to a preset threshold, may also receive an identity information acquisition request for the user sent by a verification user, send the information identifier of the identity information of the user in the identity information acquisition request sent by the verification user to the server, receive the identity information of the user and the reliability value of the identity information of the user, which are returned by the server and correspond to the information identifier, and finally return the identity information of the user and the reliability value of the identity information of the user to the verification user; the credit platform is used as a third-party guarantee mechanism for the accuracy of the identity information of the user, the trust degree of the verification user on the acquired identity information of the user is increased, and the transaction rate of completing the service by using the identity information of the user is increased.
Referring to fig. 3, fig. 3 is a flowchart illustrating interaction among a user, a verified user, a server, and a client when the method for generating a credit-based information identifier is applied to a credit platform in the case that the identity information of the user is professional information of the user according to an embodiment of the present disclosure, including steps 302 to 330.
Step 302: and the credit platform client receives the professional information uploaded by the user.
The professional information comprises the name of the user, the contact information of the user, the name of the affiliated work unit, the position of the affiliated work unit, the address of the affiliated work unit and the contact information of the work unit.
Step 304: the credit platform server receives the professional information of the user sent by the platform client.
Step 306: the credit platform server side obtains the personal historical information of the user, and under the condition that the personal historical information meets the verification condition, the professional information of the user is verified based on a preset verification mode, so that the credibility value of the professional information of the user is obtained.
Step 308: and the credit platform client receives the credibility value of the professional information of the user, which is sent by the credit platform server.
Step 310: and the credit platform client sends the credibility value of the professional information of the user to the user.
Step 312: and the credit platform client receives the information identification generation request of the user.
Step 314: and the credit platform server receives the information identifier generation request of the user sent by the platform client.
Step 316: and the credit platform server generates corresponding two-dimensional code identification for the professional information of the user according to the information identification generation request of the user under the condition that the credibility value is greater than or equal to a preset threshold value.
Step 318: and the credit platform client receives and displays the two-dimensional code identification which is generated by the credit platform server and corresponds to the professional information of the user.
Step 320: and the credit platform client returns the two-dimension code identification to the user.
Step 322: and the user prints the two-dimension code identification into a paper business card.
Step 324: and the credit platform client receives the two-dimensional code identification printed by the user and scanned by the verification user through the credit platform client.
Step 326: and the credit platform server receives the two-dimensional code identification on the paper business card printed by the user, which is scanned by the user through the credit platform client and sent by the platform client.
Step 328: and the credit platform server side determines the occupational information of the user and the credibility value of the occupational information corresponding to the two-dimension code identification based on the two-dimension code identification, and returns the occupational information of the user and the credibility value of the occupational information to a credit platform client side.
Step 330: and the credit platform client returns the professional information of the user and the credibility value of the professional information to the verification user.
In the method for generating information identifier based on credit provided by the embodiment of the specification, the user uploads the professional information through the credit platform, the credit platform provides verification service for the professional information uploaded by the user, obtaining the credibility value of the professional information uploaded by the user under the condition that the acquired personal history information meets the verification condition, when the user prints and uses the information identifier, the verification user scans and identifies the information identifier through a credit platform, the professional information of the user and the credibility value of the credit platform to the professional information of the user can be obtained, the credit platform is used as a guarantee mechanism for the accuracy of the professional information of the user, the trust degree of the verification user on the professional information of the user acquired through the credit platform is improved, and the success rate of business transaction realization of the professional information of the user acquired based on the information identification is improved.
Referring to fig. 4, fig. 4 is a flowchart illustrating an interaction between a user, a third party platform, an authenticated user, a server, and a client when the method for generating a credit-based information identifier is applied to a credit platform in the case that the identity information of the user is professional information of the user according to an embodiment of the present disclosure, which includes steps 402 to 432.
Step 402: and the credit platform client receives the professional information uploaded by the user.
The professional information comprises the name of the user, the contact information of the user, the name of the affiliated work unit, the position of the affiliated work unit, the address of the affiliated work unit and the contact information of the work unit.
Step 404: the credit platform server receives the professional information of the user sent by the platform client.
Step 406: the credit platform server side obtains the personal history information of the user, and under the condition that the personal history information does not meet the truth verification condition, the credit platform server side obtains the personal platform information of the user on a third-party platform based on the third-party platform associated with the user.
Step 408: and the credit platform server verifies the professional information of the user based on the preset verification mode and the personal platform information so as to obtain the credibility value of the professional information of the user.
Step 410: and the credit platform client receives the credibility value of the professional information of the user, which is sent by the credit platform server.
Step 412: and the credit platform client sends the credibility value of the professional information of the user to the user.
Step 414: and the credit platform client receives the information identification generation request of the user.
Step 416: and the credit platform server receives the information identifier generation request of the user sent by the platform client.
Step 418: and the credit platform server generates corresponding two-dimensional code identification for the professional information of the user according to the information identification generation request of the user under the condition that the credibility value is greater than or equal to a preset threshold value.
Step 420: and the credit platform client receives and displays the two-dimensional code identification which is generated by the credit platform server and corresponds to the professional information of the user.
Step 422: and the credit platform client returns the two-dimension code identification to the user.
Step 424: and the user prints the two-dimension code identification into a paper business card.
Step 426: and the credit platform client receives the two-dimensional code identification printed by the user and scanned by the verification user through the credit platform client.
Step 428: and the credit platform server receives the two-dimensional code identification on the paper business card printed by the user, which is scanned by the user through the credit platform client and sent by the platform client.
Step 430: and the credit platform server side determines the occupational information of the user and the credibility value of the occupational information corresponding to the two-dimension code identification based on the two-dimension code identification, and returns the occupational information of the user and the credibility value of the occupational information to a credit platform client side.
Step 432: and the credit platform client returns the professional information of the user and the credibility value of the professional information to the verification user.
In the method for generating information identifier based on credit provided by the embodiment of the present specification, a user uploads professional information through a credit platform, the credit platform provides verification for the professional information uploaded by the user, when the obtained personal history information does not satisfy a verification condition, a credibility value of the user's professional information is obtained through the user's professional information obtained by a company associated with the credit platform, and when the user prints and uses the information identifier, the user is verified to scan and identify the information identifier through the credit platform, so that the user's professional information and a credibility value of the credit platform for the user's professional information can be obtained, and the credit platform and the company associated with the user are used as a guarantee mechanism for accuracy of the user's professional information, so as to improve the credibility of the user for verifying the user's professional information obtained through the credit platform, the success rate of business transaction realization of the professional information of the user acquired based on the information identification is improved.
In actual use, by using the method, the information obtained after the user is verified to scan the code of the paper business card printed by the user based on the information identifier on the credit platform comprises the following steps: the credibility value of the professional information of the user is obtained through credit platform verification and business card information provided by a company where the user is located. The company to which the user belongs guarantees the accuracy of the professional information of the user and is responsible for the accuracy, the credibility value of the professional information given to the user by the credit platform can help the user to obtain the trust of the user when the user uses the paper business card online, for example, a salesperson can quickly obtain the trust of the user by the method, the rate of the sales is provided, and the sales company is willing to access the credit platform by the method.
Referring to fig. 5, fig. 5 is a flowchart illustrating an information obtaining method based on information identification according to an embodiment of the present specification, applied to a client, includingsteps 502 to 506.
Step 502: receiving an identity information acquisition request aiming at a user and sent by a verification user, wherein the acquisition request carries an information identifier of the user.
In specific implementation, the user identity information acquisition request sent by the verification user may be an information identifier of the user scanned by the verification user based on the client.
The information identifier of the user includes, but is not limited to, a two-dimensional code picture or a special character, which can represent the identity information of the user.
In one or more embodiments of the present specification, after receiving an identity information obtaining request for a user sent by a verified user, the method further includes:
and determining a verification code input page based on the acquisition request, and returning the verification code input page to the verification user.
Specifically, after the step of returning the verification code input page to the verification user, the method further includes:
and receiving a verification code input by the verification user based on the verification code input page, and sending the verification code to the server.
Wherein, the verification code includes but is not limited to numbers, pinyin, characters and the like.
In the embodiment of the present specification, the privacy of the identity information of the user acquired based on the information identifier is ensured by inputting the verification code.
Step 504: and sending the acquisition request to a server, and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned by the server.
The identity information of the user corresponding to the information identifier includes, but is not limited to, professional information, such as a name, a company address, and a job title of a certain person.
The credibility value of the identity information of the user can be understood as a numerical value representing the credibility of the identity information of the user, and in practical application, the higher the credibility value of the identity information of the user is, the more accurate and real the content of the identity information of the user is, and the higher the credibility is.
In one or more embodiments of the present specification, the receiving, by the server, the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which is determined based on the information identifier and is returned by the server, includes:
and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned under the condition that the verification code meets the verification condition determined by the server.
Wherein the receiving of the verification code input by the verification user based on the verification code input page comprises:
receiving the verification code acquisition request sent by the user, and sending the verification code acquisition request to the server;
receiving a verification code determined by the server based on the verification code acquisition request, and sending the verification code to the user;
and receiving the verification code which is obtained by the verification user based on the user and is input based on the verification code input page.
Specifically, the step of the server determining that the verification code meets the verification condition includes:
and the server side determines that the verification code input by the verification user based on the verification code input page is the same as the verification code obtained by the verification user based on the user.
In specific implementation, the client determines a verification code input page based on the acquisition request and returns the verification code input page to the verification user, then receiving the verification code acquisition request sent by the user, sending the verification code acquisition request to the server, receiving the verification code determined by the server based on the verification code acquisition request, for example, the verification code is a and is sent to the user, the verifying user obtains the verification code from the user, then inputting the verification code into the verification code input page of the client, and sending the received verification code to the server by the client, and when the server determines that the verification code sent by the client is consistent with the verification code sent to the user, determining that the verification code meets the verification condition.
In practical application, the verification code issued by the server side based on the user request is time-limited, for example, the effective time is 60 seconds, so that the verification user does not obtain the verification code from the user within 60 seconds, the verification code is input to the verification code input page and transmitted to the server side for verification, the verification code is failed when the verification code is verified at the server side, and the dynamic verification code can avoid the disclosure and mass propagation of the identity information of the user due to the leakage of one verification code.
Step 506: and returning the identity information of the user and the credibility value of the identity information of the user to the verified user.
The information acquisition method based on the information identifier provided by the embodiment of the present specification is applied to a client, and can directly receive, after receiving an identity information acquisition request for a user sent by a verification user, the identity information of the corresponding user and the reliability value of the identity information of the user, which are found by a server based on the information identifier of the identity information of the user carried in the acquisition request, so that the verification user can quickly obtain the identity information of the user corresponding to the information identifier and the reliability value of the identity information of the user; the method can also be used for receiving the verification code input by the verification user based on the verification code input page after receiving the identity information acquisition request aiming at the user sent by the verification user, receiving the corresponding user identity information searched by the server based on the information identification of the user identity information carried in the acquisition request and the credibility value of the user identity information under the condition that the verification code meets the verification condition, and ensuring the privacy and the safety of the user identity information in a two-dimensional code verification mode.
Referring to fig. 6, fig. 6 is a flowchart illustrating an information obtaining method based on information identification according to an embodiment of the present disclosure, applied to a server, includingsteps 602 to 606.
Step 602: receiving an obtaining request sent by a client for verifying the identity information of a user, wherein the obtaining request carries an information identifier of the user.
In one or more embodiments of the present specification, after receiving an acquisition request for verifying the identity information of a user sent by a client, the method further includes:
and receiving the verification code which is sent by the client and is input by the verification user based on the verification code input page.
Step 604: and determining the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user based on the information identifier.
In one or more embodiments of the present specification, the determining, based on the information identifier, the identity information of the user corresponding to the information identifier and the confidence value of the identity information of the user includes:
and under the condition that the verification code meets verification conditions, determining the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user based on the information identifier.
Specifically, the verification code meeting the verification condition includes:
and the verification code input by the verification user based on the verification code input page is the same as the verification code acquired by the user based on the verification code acquisition request.
In one or more embodiments of the present specification, after receiving an acquisition request for verifying the identity information of a user sent by a client, the method further includes:
receiving a verification code acquisition request of a user sent by the client;
and determining a verification code based on the verification code acquisition request, and returning the verification code to the user.
Step 606: and returning the identity information of the user and the credibility value of the identity information of the user to the client.
The information obtaining method based on the information identifier provided by the embodiment of the present specification is applied to a server, and after receiving an obtaining request of a verification user for identity information of a user sent by a client, the identity information of the user and a reliability value of the identity information of the user, which correspond to the information identifier, can be directly determined based on the information identifier, so that the verification user can quickly obtain the identity information of the user and the reliability value of the identity information of the user, which correspond to the information identifier; the method can also be used for verifying the verification code input by the verification user based on the verification code input page of the client after receiving an acquisition request of the verification user for the identity information of the user sent by the client, determining the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user based on the information identifier under the condition that the verification code meets the verification condition, and ensuring the privacy and the safety of the identity information of the user in a two-dimensional code verification mode.
Referring to fig. 7, fig. 7 is a flowchart illustrating interaction among a user, a server, and a client when the information obtaining method based on information identifier is applied to a credit platform in the case that the identity information of the user is professional information according to an embodiment of the present disclosure, which includes steps 702 to 726.
Step 702: and the credit platform client receives an acquisition request for verifying the professional information of the user corresponding to the information identification, which is realized by the user through scanning the information identification by the credit platform client.
Step 704: and the credit platform client sends the acquisition request carrying the information identification to the credit platform server.
Step 706: and the credit platform client determines a verification code input page based on the acquisition request and returns the verification code input page to the verification user.
In specific implementation, step 704 and step 706 are not sequential, and may be performed synchronously or sequentially, and are set according to actual situations, which is not limited in this application.
Step 708: and the credit platform client receives the verification code acquisition request sent by the user.
Step 710: and the credit platform client sends the verification code acquisition request to a credit platform server.
Step 712: and the credit platform server side determines the verification code based on the verification code acquisition request and returns the verification code to the credit platform client side.
Specifically, the credit platform server determines to generate a dynamic verification code based on the verification code acquisition request, and returns the dynamic verification code to the credit platform client, wherein the effective time of the dynamic verification code can be set to 10 seconds or 60 seconds and the like according to actual requirements, that is, after 10 seconds or 60 seconds, the credit platform server automatically refreshes the dynamic verification code, regenerates a new verification code, avoids a fixed verification code from being reused, and plays a role in safety protection on occupational information of the user.
Step 714: and the credit platform client receives a verification code determined by the credit platform server based on the verification code acquisition request and sends the verification code to the user.
Step 716: and the user sends the verification code to the verification user.
The way of sending the verification code to the verification user by the user may be various, for example, the verification code is directly displayed to the verification user face to face, or sent to the verification user by short message, mail, or the like, which is not limited herein.
Step 718: and the credit platform client receives the verification code input by the verification user on the verification code input page.
Step 720: and the credit platform client sends the verification code input by the verification user on the verification code input page to a credit platform server.
Step 722: and the credit platform server side determines the professional information corresponding to the information identifier and the credibility value of the professional information based on the information identifier under the condition that the verification code input by the verification user based on the verification code input page is the same as the verification code obtained by the verification user based on the user.
Step 724: and the credit platform server side returns the professional information corresponding to the information identification and the credibility value of the professional information to the credit platform client side.
Step 726: and the credit platform client returns the received professional information corresponding to the information identification and the credibility value of the professional information to the verification user.
In the information obtaining method based on the information identifier according to the embodiment of the specification, after the credit platform client receives the information identifier provided by the verification user, the information identifier is sent to the credit platform server and returned to the verification user through a verification code input page, after the verification code input by the verification user through the verification code input page is received, the verification code is transmitted to the credit platform server, the credit platform server judges whether the verification code is a valid verification code transmitted to the user by the credit platform server, if so, the user can be determined to be the user who agrees to display the own professional information corresponding to the information identifier to the verification user, under the condition, the credit platform server searches the professional information corresponding to the information identifier based on the information identifier, then sends the professional information to the credit platform client, and the credit platform client returns the professional information to the verification user, the method is used for verifying the occupational information of the user, the fact that the occupational information of the user corresponding to the information identification can be checked only after the user is authorized by the verification user is guaranteed through a dynamic verification code mode, the occupational information of the user is protected safely by the method, the credibility of the verification user on the occupational information of the user obtained through a credit platform is greatly improved, the positivity of the user for generating the information identification corresponding to the occupational information through the credit platform is increased, and therefore the activity and the browsed rate of the credit platform are improved.
Corresponding to the above method embodiment, the present specification further provides an embodiment of a credit-based information identifier generation apparatus, and fig. 8 shows a schematic structural diagram of a credit-based information identifier generation apparatus provided in an embodiment of the present specification. As shown in fig. 8, the apparatus includes:
a first receiving module 802 configured to receive identity information of a user sent by a client;
the first verification module 804 is configured to verify the identity information of the user based on a preset verification mode to obtain a reliability value of the identity information of the user, and return the reliability value to the client;
a second receiving module 806, configured to receive the information identifier generation request of the user sent by the client;
the first generating module 808 is configured to, when the reliability value is greater than or equal to a preset threshold, generate an information identifier in a preset format from the identity information of the user according to the information identifier generation request of the user, and send the information identifier to the client.
Optionally, the first true-to-check module 804 is further configured to:
acquiring personal history information of the user;
and under the condition that the personal history information meets a verification condition, verifying the identity information of the user based on the preset verification mode and the personal history information.
Optionally, the apparatus further includes:
the first obtaining module is configured to obtain personal platform information of the user on a third-party platform based on the third-party platform associated with the user under the condition that the personal historical information does not meet a verification condition, and verify the identity information of the user based on the preset verification mode and the personal platform information.
Optionally, the first generating module 808 is further configured to:
and generating a request according to the information identifier of the user to determine the identity information of the user corresponding to the user, and configuring the unique information identifier with a preset format for the identity information of the user.
Optionally, the apparatus further includes:
and the second generation module is configured to generate a form based on the identity information of the user and the information identifier corresponding to the identity information of the user, and store the form in the server.
Optionally, the apparatus further includes:
a ninth receiving module, configured to receive an obtaining request for verifying identity information of a user, where the obtaining request is sent by a client and carries an information identifier of the user;
a second determination module configured to determine, based on the information identifier, identity information of the user corresponding to the information identifier and a confidence value of the identity information of the user;
a third returning module configured to return the identity information of the user and the credibility value of the identity information of the user to the client.
Optionally, the second determining module is further configured to:
searching the form corresponding to the information identifier based on the information identifier;
and determining the identity information of the user and the credibility value of the identity information of the user corresponding to the information identifier based on the form and the information identifier.
The above is an exemplary scheme of a credit-based information identifier generating apparatus according to this embodiment. It should be noted that the technical solution of the credit-based information identifier generating apparatus and the technical solution of the credit-based information identifier generating method belong to the same concept, and details of the technical solution of the credit-based information identifier generating apparatus, which are not described in detail, can be referred to the description of the technical solution of the credit-based information identifier generating method.
Corresponding to the above method embodiment, the present specification further provides an embodiment of a credit-based information identifier generation apparatus, and fig. 9 shows a schematic structural diagram of another credit-based information identifier generation apparatus provided in an embodiment of the present specification. As shown in fig. 9, the apparatus includes:
a third receiving module 902, configured to receive the identity information of the user uploaded by the user, and send the identity information of the user to the server;
a fourth receiving module 904, configured to receive the identity information of the user verified by the server in a preset verification manner, obtain a reliability value of the identity information of the user, and send the reliability value to the user;
a fifth receiving module 906, configured to receive the information identifier generation request of the user, and send the information identifier generation request of the user to a server;
a sixth receiving module 908, configured to receive, when the reliability value is greater than or equal to a preset threshold value, an information identifier in a preset format, which is generated by the identity information of the user according to the information identifier generation request of the user and is sent to the user, where the information identifier is sent by the server.
Optionally, the apparatus further includes:
a tenth receiving module, configured to receive an identity information acquisition request for a user sent by a verified user, where the acquisition request carries an information identifier of the user;
the second sending module is configured to send the acquisition request to a server and receive the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are returned by the server;
a fourth returning module configured to return the identity information of the user and the confidence value of the identity information of the user to the verified user.
The above is an exemplary scheme of a credit-based information identifier generating apparatus according to this embodiment. It should be noted that the technical solution of the credit-based information identifier generating apparatus and the technical solution of the credit-based information identifier generating method belong to the same concept, and details of the technical solution of the credit-based information identifier generating apparatus, which are not described in detail, can be referred to the description of the technical solution of the credit-based information identifier generating method.
Corresponding to the above method embodiment, the present specification further provides an information acquisition apparatus embodiment based on information identification, and fig. 10 shows a schematic structural diagram of an information acquisition apparatus based on information identification provided in an embodiment of the present specification. As shown in fig. 10, the apparatus includes:
a seventh receiving module 1002, configured to receive an identity information obtaining request for a user sent by a verified user, where the obtaining request carries an information identifier of the user;
a first sending module 1004, configured to send the obtaining request to a server, and receive identity information of the user corresponding to the information identifier and a reliability value of the identity information of the user, which are determined based on the information identifier and returned by the server;
a first returning module 1006 configured to return the identity information of the user and the confidence value of the identity information of the user to the verified user.
Optionally, the apparatus further includes:
a third determination module configured to determine a passcode entry page based on the acquisition request and return the passcode entry page to the verified user.
Optionally, the apparatus further includes:
an eleventh receiving module, configured to receive a verification code input by the verification user based on the verification code input page, and send the verification code to the server.
Optionally, the first sending module 1004 is further configured to:
and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned under the condition that the verification code meets the verification condition determined by the server.
Optionally, the eleventh receiving module is further configured to:
receiving the verification code acquisition request sent by the user, and sending the verification code acquisition request to the server;
receiving a verification code determined by the server based on the verification code acquisition request, and sending the verification code to the user;
and receiving the verification code which is obtained by the verification user based on the user and is input based on the verification code input page.
Optionally, the step of the verification code satisfying the verification condition includes:
and the verification code input by the verification user based on the verification code input page is the same as the verification code obtained by the verification user based on the user.
The above is an illustrative scheme of an information acquisition apparatus based on information identification according to this embodiment. It should be noted that the technical solution of the information acquisition apparatus based on the information identifier belongs to the same concept as the technical solution of the information acquisition method based on the information identifier, and details of the technical solution of the information acquisition apparatus based on the information identifier, which are not described in detail, can be referred to the description of the technical solution of the information acquisition method based on the information identifier.
Corresponding to the above method embodiment, the present specification further provides an information acquisition apparatus embodiment based on information identification, and fig. 11 shows a schematic structural diagram of another information acquisition apparatus based on information identification, provided in an embodiment of the present specification. As shown in fig. 11, the apparatus includes:
an eighth receiving module 1102, configured to receive an obtaining request for verifying identity information of a user, where the obtaining request carries an information identifier of the user, where the obtaining request is sent by a client;
a first determining module 1104 configured to determine, based on the information identifier, identity information of the user corresponding to the information identifier and a confidence value of the identity information of the user;
a second returning module 1106 configured to return the identity information of the user and the trustworthiness value of the identity information of the user to the client.
Optionally, the apparatus further includes:
a twelfth receiving module configured to receive the verification code input by the verification user based on the verification code input page, which is sent by the client.
Optionally, the first determining module 1104 is further configured to:
and under the condition that the verification code meets verification conditions, determining the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user based on the information identifier.
Optionally, the apparatus further includes:
a thirteenth receiving module, configured to receive a verification code obtaining request of a user sent by the client;
a fourth determination module configured to determine a verification code based on the verification code acquisition request and return the verification code to the user.
Optionally, the step of the verification code satisfying the verification condition includes:
and the verification code input by the verification user based on the verification code input page is the same as the verification code acquired by the user based on the verification code acquisition request.
The above is an illustrative scheme of an information acquisition apparatus based on information identification according to this embodiment. It should be noted that the technical solution of the information acquisition apparatus based on the information identifier belongs to the same concept as the technical solution of the information acquisition method based on the information identifier, and details of the technical solution of the information acquisition apparatus based on the information identifier, which are not described in detail, can be referred to the description of the technical solution of the information acquisition method based on the information identifier.
FIG. 12 illustrates a block diagram of a computing device 1200 provided according to one embodiment of the present description. The components of the computing device 1200 include, but are not limited to, memory 1210 and processor 1220. Processor 1220 is coupled to memory 1210 via bus 1230, and database 1250 is used to store data.
The computing device 1200 also includes an access device 1240, the access device 1240 enabling the computing device 1200 to communicate via one or more networks 1260. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 1240 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1200 and other components not shown in FIG. 12 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 12 is for purposes of example only and is not limiting as to the scope of the description. Those skilled in the art may add or replace other components as desired.
Computing device 1200 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smartphone), wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1200 may also be a mobile or stationary server.
Wherein processor 1220 is configured to execute the following computer-executable instructions:
receiving user identity information sent by a client;
verifying the identity information of the user based on a preset verification mode to obtain a credibility value of the identity information of the user, and returning the credibility value to the client;
receiving an information identifier generation request of the user sent by the client;
under the condition that the credibility value is greater than or equal to a preset threshold value, generating an information identifier in a preset format from the identity information of the user according to an information identifier generation request of the user, and sending the information identifier to the client; or
Receiving user identity information uploaded by a user, and sending the user identity information to a server;
receiving the identity information of the user verified by the server based on a preset verification mode to obtain a credibility value of the identity information of the user, and sending the credibility value to the user;
receiving an information identifier generation request of the user, and sending the information identifier generation request of the user to a server;
and receiving an information identifier in a preset format generated by the identity information of the user according to the information identifier generation request of the user and sent by the server side under the condition that the reliability value is greater than or equal to a preset threshold value, and sending the information identifier to the user.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the above technical solution of the credit-based information identifier generation method applied to the server or the client belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the above description of the technical solution of the credit-based information identifier generation method applied to the server or the client.
FIG. 13 illustrates a block diagram of another computing device 1300 provided in accordance with one embodiment of the present description. The components of the computing device 1300 include, but are not limited to, a memory 1310 and a processor 1320. The processor 1320 is coupled to the memory 1310 via the bus 1330, and the database 1350 is used to store data.
Computing device 1300 also includes access device 1340, access device 1340 enables computing device 1300 to communicate via one or more networks 1360. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 1340 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 1300 and other components not shown in FIG. 13 may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 13 is for purposes of example only and is not limiting as to the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 1300 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smartphone), wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 1300 can also be a mobile or stationary server.
Among other things, processor 1320 is configured to execute the following computer-executable instructions:
receiving an identity information acquisition request aiming at a user and sent by a verification user, wherein the acquisition request carries an information identifier of the user;
sending the acquisition request to a server, and receiving the identity information of the user corresponding to the information identifier and the credibility value of the identity information of the user, which are determined based on the information identifier and returned by the server;
returning the identity information of the user and the credibility value of the identity information of the user to the verification user; or
Receiving an acquisition request sent by a client for verifying the identity information of a user, wherein the acquisition request carries an information identifier of the user;
determining identity information of the user corresponding to the information identifier and a credibility value of the identity information of the user based on the information identifier;
and returning the identity information of the user and the credibility value of the identity information of the user to the client.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the above technical solution of the information acquisition method based on the information identifier applied to the server or the client belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the above description of the technical solution of the information acquisition method based on the information identifier applied to the server or the client.
An embodiment of the present specification further provides a computer readable storage medium storing computer instructions, which when executed by a processor, implement the steps of the credit-based information identifier generation method applied to a server or the steps of the credit-based information identifier generation method applied to a client.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the above technical solution of the credit-based information identifier generation method applied to the server or the client belong to the same concept, and details that are not described in detail in the technical solution of the storage medium can be referred to the above description of the technical solution of the credit-based information identifier generation method applied to the server or the client.
An embodiment of the present specification further provides a computer readable storage medium, which stores computer instructions, and when the instructions are executed by a processor, the computer instructions implement the steps of the information identifier-based information acquisition method applied to a server or the steps of the information identifier-based information acquisition method applied to a client.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium and the above-mentioned technical solution of the information acquisition method based on the information identifier applied to the server or the client belong to the same concept, and details of the technical solution of the storage medium, which are not described in detail, can be referred to the above-mentioned description of the technical solution of the information acquisition method based on the information identifier applied to the server or the client.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts, but those skilled in the art should understand that the present embodiment is not limited by the described acts, because some steps may be performed in other sequences or simultaneously according to the present embodiment. Further, those skilled in the art should also appreciate that the embodiments described in this specification are preferred embodiments and that acts and modules referred to are not necessarily required for an embodiment of the specification.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the embodiments and the practical application, to thereby enable others skilled in the art to best understand and utilize the embodiments. The specification is limited only by the claims and their full scope and equivalents.

Claims (28)

CN201911302862.9A2019-12-172019-12-17Credit-based information identifier generation method and deviceActiveCN111010395B (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN202111316346.9ACN113949585A (en)2019-12-172019-12-17 Credit-based information identification generation method and device
CN201911302862.9ACN111010395B (en)2019-12-172019-12-17Credit-based information identifier generation method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201911302862.9ACN111010395B (en)2019-12-172019-12-17Credit-based information identifier generation method and device

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
CN202111316346.9ADivisionCN113949585A (en)2019-12-172019-12-17 Credit-based information identification generation method and device

Publications (2)

Publication NumberPublication Date
CN111010395Atrue CN111010395A (en)2020-04-14
CN111010395B CN111010395B (en)2021-09-24

Family

ID=70115839

Family Applications (2)

Application NumberTitlePriority DateFiling Date
CN202111316346.9APendingCN113949585A (en)2019-12-172019-12-17 Credit-based information identification generation method and device
CN201911302862.9AActiveCN111010395B (en)2019-12-172019-12-17Credit-based information identifier generation method and device

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
CN202111316346.9APendingCN113949585A (en)2019-12-172019-12-17 Credit-based information identification generation method and device

Country Status (1)

CountryLink
CN (2)CN113949585A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113949585A (en)*2019-12-172022-01-18支付宝(杭州)信息技术有限公司 Credit-based information identification generation method and device
CN114611082A (en)*2022-03-092022-06-10京东科技信息技术有限公司Method and device for processing identity information

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101466098A (en)*2009-01-212009-06-24中国人民解放军信息工程大学Method, device and communication system for evaluating network trust degree
CN103401852A (en)*2013-07-232013-11-20徐华Two-dimensional code smart business card system based on authentication and design method thereof
US20140223187A1 (en)*2008-01-072014-08-07Unify Gmbh & Co. KgMethod for Authenticating Key Information Between Terminals of a Communication Link
CN104144419A (en)*2014-01-242014-11-12腾讯科技(深圳)有限公司Identity authentication method, device and system
CN105100206A (en)*2015-06-152015-11-25北京奇虎科技有限公司Method, equipment and system for pushing business card
CN106487762A (en)*2015-08-312017-03-08腾讯科技(深圳)有限公司The recognition methodss of user identity, identification applications client and server
CN108616360A (en)*2018-03-222018-10-02阿里巴巴集团控股有限公司User identity verification, register method and device
EP3451218A1 (en)*2017-09-012019-03-06Trustonic LimitedPost-manufacture generation of device certificate and private key for public key infrastructure
CN109598663A (en)*2018-11-162019-04-09阿里巴巴集团控股有限公司Method and device for providing and acquiring security identity information
CN110099029A (en)*2018-01-302019-08-06阿里健康信息技术有限公司A kind of auth method, terminal device and server
CN110245192A (en)*2019-06-202019-09-17京东方科技集团股份有限公司 Identity information query method and system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140237570A1 (en)*2013-02-152014-08-21Rawllin International Inc.Authentication based on social graph transaction history data
CN106557923A (en)*2015-09-292017-04-05腾讯科技(深圳)有限公司A kind of information processing method and system, Information Authentication method and apparatus
CN108076018A (en)*2016-11-162018-05-25阿里巴巴集团控股有限公司Identity authorization system, method, apparatus and account authentication method
CN106778139A (en)*2016-12-302017-05-31中国民航信息网络股份有限公司Passenger's identity verification method and system
CN107086909B (en)*2017-03-072021-01-12创新先进技术有限公司Identity information generation method and device and identity verification method and device
CN108632271B (en)*2018-05-042021-07-13平安科技(深圳)有限公司Identity authentication method and device
US10270771B1 (en)*2018-06-272019-04-23Gregory TamaniniMid-session live user authentication
CN109191112B (en)*2018-07-162021-09-28创新先进技术有限公司Identity verification method and device
CN109327312B (en)*2018-10-262020-03-24阿里巴巴集团控股有限公司Authentication method and device and electronic equipment
CN116578962A (en)*2019-07-242023-08-11创新先进技术有限公司Identity verification method, device and equipment
CN110519294B (en)*2019-09-122021-08-31创新先进技术有限公司Identity authentication method, device, equipment and system
CN113949585A (en)*2019-12-172022-01-18支付宝(杭州)信息技术有限公司 Credit-based information identification generation method and device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140223187A1 (en)*2008-01-072014-08-07Unify Gmbh & Co. KgMethod for Authenticating Key Information Between Terminals of a Communication Link
CN101466098A (en)*2009-01-212009-06-24中国人民解放军信息工程大学Method, device and communication system for evaluating network trust degree
CN103401852A (en)*2013-07-232013-11-20徐华Two-dimensional code smart business card system based on authentication and design method thereof
CN104144419A (en)*2014-01-242014-11-12腾讯科技(深圳)有限公司Identity authentication method, device and system
CN105100206A (en)*2015-06-152015-11-25北京奇虎科技有限公司Method, equipment and system for pushing business card
CN106487762A (en)*2015-08-312017-03-08腾讯科技(深圳)有限公司The recognition methodss of user identity, identification applications client and server
EP3451218A1 (en)*2017-09-012019-03-06Trustonic LimitedPost-manufacture generation of device certificate and private key for public key infrastructure
CN110099029A (en)*2018-01-302019-08-06阿里健康信息技术有限公司A kind of auth method, terminal device and server
CN108616360A (en)*2018-03-222018-10-02阿里巴巴集团控股有限公司User identity verification, register method and device
CN109598663A (en)*2018-11-162019-04-09阿里巴巴集团控股有限公司Method and device for providing and acquiring security identity information
CN110245192A (en)*2019-06-202019-09-17京东方科技集团股份有限公司 Identity information query method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
WEI WEI;IRWIN KING: "Measuring credibility of users in an E-learning social network", 《2010 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION》*
杨威: "基于信任度的角色访问控制系统的设计与实现", 《中国优秀博硕士学位论文全文数据库 信息科技辑》*
牟盈学: "浅析电子身份证的生成流程与作用", 《科技风》*

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113949585A (en)*2019-12-172022-01-18支付宝(杭州)信息技术有限公司 Credit-based information identification generation method and device
CN114611082A (en)*2022-03-092022-06-10京东科技信息技术有限公司Method and device for processing identity information

Also Published As

Publication numberPublication date
CN113949585A (en)2022-01-18
CN111010395B (en)2021-09-24

Similar Documents

PublicationPublication DateTitle
US11068575B2 (en)Authentication system
US11170091B2 (en)Method and apparatus for providing and obtaining secure identity information
US9928485B2 (en)Computational systems and methods for regulating information flow during interactions
CN103609090B (en) Identity login method and equipment
KR100858144B1 (en) User authentication method and device in internet site using mobile communication terminal
US10185814B2 (en)Computational systems and methods for verifying personal information during transactions
US10764304B2 (en)User location check method, controlled device access method, controlled device, and user terminal
US20130060625A1 (en)Computational systems and methods for regulating information flow during interactions
US20190073675A1 (en)Digital user identity verification
US20160048494A1 (en)Form filling method and related terminal
CN103986688A (en)Method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
US9690853B2 (en)Computational systems and methods for regulating information flow during interactions
WO2016026432A1 (en)Business card information query method and cloud server
CN107294832B (en)Method and device for adding friends
US10198729B2 (en)Computational systems and methods for regulating information flow during interactions
US20190370743A1 (en)Method for acquiring user information and relevant device
CN111010395B (en)Credit-based information identifier generation method and device
CN110011896B (en)Data processing method and device, computing equipment and storage medium
CN104009955B (en)A kind of processing method of associated person information, device and system
US20130060852A1 (en)Computational systems and methods for regulating information flow during interactions
CN108990061B (en) Method, device and system for anti-theft of ID card number
TW202008199A (en)Identity authentication method and apparatus, and computing device and storage medium
CN106656531A (en)Communication method and system for providing different information pages according to user information
CN102868981A (en)Network service push method, device and system based on mobile terminal
CN111209546A (en)Online multi-person identity authentication method, system and device and identity authentication equipment

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp