Disclosure of Invention
The disclosed embodiments are directed to solving at least one of the technical problems of the related art or the related art.
To this end, a first aspect of the embodiments of the present disclosure is to provide an information processing method.
A second aspect of the embodiments of the present disclosure is to provide a computer device.
A third aspect of the embodiments of the present disclosure is to provide a computer-readable storage medium.
In view of this, according to a first aspect of the embodiments of the present disclosure, there is provided an information processing method including: sending the user basic information of the current login account to a server of a target asset management mechanism, so that the server executes identity authentication operation and three-party protocol signing operation on the current login account and generates corresponding signing information; receiving subscription information fed back by a server; and associating the current login account and the account information of the target asset management mechanism according to the subscription information.
The information processing method provided by the embodiment of the disclosure is particularly used for a third-party payment application program, when a user needs to perform identity authentication and sign a three-party protocol for payment, the user basic information of a current login account is sent to a server of a target asset management mechanism which grasps user assets and privacy information, the server executes identity authentication operation and three-party protocol signing operation, so that the payment company can be isolated from touching and storing the privacy information, and the application (namely the server of the target asset management mechanism) which grasps the assets and the privacy information completes verification and protocol signing, so that on one hand, the security of the user privacy is ensured, on the other hand, the operating pressure of the payment application program server can be reduced, and the operating efficiency of the payment application program server is improved. And then, the payment application program completes the association of the payment application program and the account number of the target asset management mechanism according to the subscription information fed back by the server, and can perform the control within a certain limit on the fund of the user in the target asset management mechanism in the subsequent payment process.
In addition, according to the information processing method in the above technical solution provided by the embodiment of the present disclosure, the following additional technical features may also be provided:
in the above technical solution, preferably, the user basic information includes a name and an identification number.
In the technical scheme, the user basic information comprises a name and an identification card number which are enough to reflect the identity of the user, so that a target asset management mechanism can execute subsequent operations according to the identity, the information transmission amount can be reduced, and the privacy of the user can be protected.
In any of the above technical solutions, preferably, the subscription information includes user basic information, account information and a protocol number stored in the server and associated with the user basic information.
In the technical scheme, the subscription information comprises the basic information of the user, so that the payment application program can check whether the information is consistent or not conveniently; the account information is information registered by the user in the target asset management mechanism, so that the fund receipt and payment operation is conveniently executed, and the relationship between the basic information of the user and the account information of the plurality of application programs is favorably correlated; the protocol number reflects the successful signing of the three-party protocol, which is convenient for executing fund receipt and payment operation without transmitting the whole three-party protocol, thereby reducing the information transmission amount and lightening the operation pressure.
In any of the above technical solutions, preferably, before the operation of sending the user basic information of the current login account to the server of the target asset management authority, the information processing method further includes: and outputting prompt information to prompt the user to input basic information of the user.
In the technical scheme, the user can be reminded to input the basic information of the user in time by outputting the prompt information, and the successful execution of the signing process is ensured. The output of the prompt information can be realized by displaying a text input box, and specific information names, namely names and identity card numbers, are marked beside the text input box so that a user can input the names and the identity card numbers in the corresponding text input box.
In any one of the above technical solutions, preferably, before the operation of outputting the prompt information, the information processing method further includes: and judging whether the basic information of the user is stored or not, and if not, executing the operation of outputting the prompt information.
In the technical scheme, whether the basic user information is stored or not is judged, and if the basic user information is stored, the basic user information does not need to be input again, so that the user operation is further simplified, and the information processing burden is reduced.
In any one of the above technical solutions, preferably, after the operation of outputting the prompt information, the information processing method further includes: and checking whether the name in the user basic information corresponds to the identity card number, if so, executing the operation of sending the user basic information of the current login account to a server of the target asset management mechanism.
In the technical scheme, the payment application program firstly carries out real-name verification on the basic information of the user to be used as basic identity verification, so that the identity authentication process of the server of the target asset management mechanism can be simplified. Specifically, the real-name verification is carried out on the user basic information acquired for the first time, and the real-name verification is carried out on the user basic information which is not acquired for the first time and is stored, so that the verification is not required to be carried out in the subsequent use, the real-name verification on the payment application program can replace the real-name verification of the servers of a plurality of subsequent target asset management mechanisms, the same basic identity verification result can be ensured to be used among the plurality of application programs, the assets of different application programs on the same terminal are determined to belong to the same person, the repeated verification is reduced, and the optimization of the operating efficiency of the servers of the target asset management mechanisms is facilitated.
In any one of the above technical solutions, preferably, after the step of receiving the subscription information fed back by the server, the information processing method further includes: outputting the subscription information and confirmation reminding information to remind a user to confirm the subscription information; and saving the subscription information according to the received feedback information.
In the technical scheme, after the subscription information fed back by the server is received, the subscription information is not directly stored but delivered to the user for secondary confirmation, so that the reliability of information processing can be improved. In addition, the subscription information is not sent by short messages, so that the privacy of the user can be prevented from being hijacked, and the occupation of the short messages on the data storage space of the terminal can be reduced.
In any of the above technical solutions, preferably, before the operation of sending the user basic information of the current login account to the server of the target asset management authority, the information processing method further includes: outputting a list of asset management mechanisms, wherein the list of asset management mechanisms comprises at least one asset management mechanism for a user to select; and acquiring the selected asset management mechanism and recording as a target asset management mechanism.
In the technical scheme, the asset management mechanism list is output, so that the user can directly select from the asset management mechanism list, the input operation of the user is simplified, and the problem of irregular name input by the user is avoided.
In any of the above technical solutions, preferably, after the step of acquiring the selected asset management entity and recording as the target asset management entity, before the step of sending the user basic information of the current login account to the server of the target asset management entity, the information processing method further includes: detecting whether an application program of a target asset management mechanism is installed on a terminal for logging in a current login account; based on the condition that the detection result is yes, executing the operation of sending the user basic information of the current login account to the server of the target asset management mechanism; and outputting a downloading link for the terminal to install the application program based on the condition that the detection result is negative, and executing the operation of sending the user basic information of the current login account to the server of the target asset management mechanism after the installation is finished.
In the technical scheme, when the terminal is not provided with the application program of the target asset management mechanism, the user can be guided to directly operate and download by outputting the download link, so that the subsequent authentication and signing operations are ensured to be carried out smoothly, and the user operation is facilitated.
According to a second aspect of the embodiments of the present disclosure, there is provided a computer device, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of the information processing method according to any of the above technical solutions when executing the computer program, so that the method has all the beneficial technical effects of the information processing method, and details are not described herein.
According to a third aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium, on which a computer program is stored, where the computer program, when being executed by a processor, implements the steps of the information processing method according to any of the above technical solutions, so that the information processing method has all the beneficial technical effects, and details are not repeated herein.
Additional aspects and advantages of the disclosed embodiments will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the disclosed embodiments.
Detailed Description
In order that the above objects, features and advantages of the embodiments of the present disclosure can be more clearly understood, embodiments of the present disclosure will be described in further detail below with reference to the accompanying drawings and detailed description. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure, however, the embodiments of the disclosure may be practiced in other ways than those described herein, and therefore the scope of the embodiments of the disclosure is not limited by the specific embodiments disclosed below.
An embodiment of a first aspect of an embodiment of the present disclosure provides an information processing method.
Fig. 1 shows a schematic flow chart of an information processing method according to a first embodiment of the embodiments of the present disclosure.
As shown in fig. 1, an information processing method according to a first embodiment of the present disclosure includes:
s102, sending user basic information of the current login account to a server of a target asset management mechanism, so that the server executes identity authentication operation and three-party protocol signing operation on the current login account and generates corresponding signing information;
s104, receiving subscription information fed back by the server;
and S106, associating the current login account with the account information of the target asset management mechanism according to the subscription information.
The information processing method provided by the embodiment of the disclosure is particularly used for a third-party payment application program, when a user needs to perform identity authentication and sign a three-party protocol for payment, the user basic information of a current login account is sent to a server of a target asset management mechanism which grasps user assets and privacy information, the server executes identity authentication operation and three-party protocol signing operation, so that the payment company can be isolated from touching and storing the privacy information, and the application (namely the server of the target asset management mechanism) which grasps the assets and the privacy information completes verification and protocol signing, so that on one hand, the security of the user privacy is ensured, on the other hand, the operating pressure of the payment application program server can be reduced, and the operating efficiency of the payment application program server is improved. And then, the payment application program completes the association of the payment application program and the account number of the target asset management mechanism according to the subscription information fed back by the server, and can perform the control within a certain limit on the fund of the user in the target asset management mechanism in the subsequent payment process. Specifically, the method can be used for a terminal loaded with the payment application program and can also be used for a server of the payment application program.
In some embodiments, the user basic information includes a name and an identification number.
In this embodiment, the user basic information includes a name and an identification number, which are sufficient to reflect the identity of the user, so that the target asset management authority can perform subsequent operations accordingly, which can reduce the amount of transmitted information and help to protect the privacy of the user.
In some embodiments, the subscription information includes user basic information, account information stored in the server and associated with the user basic information, and a protocol number.
In this embodiment, the subscription information includes the basic information of the user, which is convenient for the payment application program to check whether the information is consistent; the account information is information registered by the user in the target asset management mechanism, so that the fund receipt and payment operation is conveniently executed, and the relationship between the basic information of the user and the account information of the plurality of application programs is favorably correlated; the protocol number reflects the successful signing of the three-party protocol, which is convenient for executing fund receipt and payment operation without transmitting the whole three-party protocol, thereby reducing the information transmission amount and lightening the operation pressure.
Fig. 2 shows a schematic flow chart of an information processing method according to a second embodiment of the embodiments of the present disclosure.
As shown in fig. 2, an information processing method according to a second embodiment of the present disclosure includes:
s202, judging whether user basic information corresponding to the current login account is stored or not, wherein the user basic information comprises a name and an identity card number, if yes, turning to S208, and if not, turning to S204;
s204, outputting prompt information to prompt a user to input basic information of the user;
s206, checking whether the name in the user basic information corresponds to the ID card number, if so, turning to S208, and if not, turning to S214;
s208, sending the basic information of the user to a server of a target asset management mechanism, so that the server executes identity authentication operation and three-party protocol signing operation on the current login account and generates corresponding signing information;
s210, receiving subscription information fed back by a server;
s212, associating the current login account and the account information of the target asset management mechanism according to the subscription information;
s214, outputting error information to prompt that the name is not consistent with the identification number.
In this embodiment, it is first determined in S202 whether the user basic information has been stored, and if the user basic information has been stored, the user basic information is directly transferred to S208 without inputting again, thereby further simplifying the user operation and reducing the information processing load. If it is determined in S202 that the basic user information is not stored, the process goes to S204 to output a prompt message to prompt the user to input the basic user information in time, so as to ensure that the signing process is performed smoothly. The output of the prompt information can be realized by displaying a text input box, and specific information names, namely names and identity card numbers, are marked beside the text input box so that a user can input the names and the identity card numbers in the corresponding text input box.
In addition, in S206, the payment application performs real-name verification on the basic user information as a basic identity check, so as to simplify the authentication process of the server of the target asset management entity. Specifically, the real-name verification is performed on the user basic information acquired for the first time in S204, and for the user basic information which is confirmed to be stored and is not acquired for the first time in S202, because the real-name verification is performed at the time of the first acquisition, the verification is not required to be performed at the time of subsequent use, so that the real-name verification performed at one time on the payment application program can replace the real-name verification performed on the servers of the plurality of subsequent target asset management mechanisms, and not only can the same basic identity verification result be ensured to be used among the plurality of application programs, the asset attribution of different application programs on the same terminal to the same person is determined, but also the repeated verification is reduced, and the optimization of the operating efficiency of the servers of the target asset management mechanisms is facilitated.
Fig. 3 shows a schematic flow chart of an information processing method according to a third embodiment of the embodiments of the present disclosure.
As shown in fig. 3, an information processing method according to a third embodiment of the present disclosure includes:
s302, sending the user basic information of the current login account to a server of a target asset management mechanism, so that the server executes identity authentication operation and three-party protocol signing operation on the current login account and generates corresponding signing information;
s304, receiving subscription information fed back by the server;
s306, outputting the subscription information and the confirmation reminding information to remind the user to confirm the subscription information;
s308, saving the subscription information according to the received feedback information;
and S310, associating the current login account with the account information of the target asset management mechanism according to the subscription information.
In this embodiment, after receiving the subscription information fed back by the server, the subscription information is not directly stored, but is handed to the user for secondary confirmation, so that the reliability of information processing can be improved. In addition, the subscription information is not sent by short messages, so that the privacy of the user can be prevented from being hijacked, and the occupation of the short messages on the data storage space of the terminal can be reduced.
Fig. 4 shows a schematic flow chart of an information processing method according to a fourth embodiment of the present disclosure.
As shown in fig. 4, an information processing method according to a fourth embodiment of the present disclosure includes:
s402, outputting an asset management mechanism list, wherein the asset management mechanism list comprises at least one asset management mechanism for a user to select;
s404, acquiring the selected asset management mechanism and recording as a target asset management mechanism;
s406, outputting prompt information to prompt a user corresponding to the current login account to input user basic information, wherein the user basic information comprises a name and an identity card number;
s408, checking whether the name in the user basic information corresponds to the ID card number, if so, turning to S410, and if not, turning to S416;
s410, sending the basic information of the user to a server of a target asset management mechanism, so that the server can execute identity authentication operation and three-party protocol signing operation on the current login account and generate corresponding signing information;
s412, receiving subscription information fed back by the server;
s414, associating the current login account and the account information of the target asset management mechanism according to the subscription information;
s416, outputting error information to prompt that the name is not consistent with the identification number.
In the embodiment, the asset management mechanism list is output, so that the user can directly select from the asset management mechanism list, the input operation of the user is simplified, and the problem of irregular name input by the user is avoided.
Fig. 5 shows a schematic flowchart of an information processing method according to a fifth embodiment of the present disclosure.
As shown in fig. 5, the information processing method of the fifth embodiment of the present disclosure includes:
s502, outputting an asset management mechanism list, wherein the asset management mechanism list comprises at least one asset management mechanism for a user to select;
s504, acquiring the selected asset management mechanism and recording as a target asset management mechanism;
s506, outputting prompt information to prompt a user corresponding to the current login account to input user basic information, wherein the user basic information comprises a name and an identity card number;
s508, checking whether the name in the user basic information corresponds to the ID card number, if so, turning to S510, and if not, turning to S522;
s510, detecting whether an application program of a target asset management mechanism is installed on a terminal for logging in a current login account, if so, turning to S512, and if not, turning to S514;
s512, sending the basic information of the user to a server of a target asset management mechanism, so that the server executes identity authentication operation and three-party protocol signing operation on the current login account and generates corresponding signing information;
s514, outputting the downloading link for the terminal to install the application program;
s516, judging whether the application program is installed completely, if so, turning to S512, and if not, returning to S516;
s518, receiving subscription information fed back by the server;
s520, associating the current login account and the account information of the target asset management mechanism according to the subscription information;
s522, outputting error information to prompt that the name is not consistent with the identification number.
In the embodiment, when the terminal is not provided with the application program of the target asset management mechanism, the user can be guided to directly operate and download by outputting the download link, so that the successful proceeding of the subsequent authentication and signing operations is ensured, and the user operation is facilitated.
Next, an information processing method provided by an embodiment of the present disclosure is described as a specific embodiment with reference to fig. 6:
firstly, entering a payment application program, displaying a bank list, selecting a commercial bank by a user, requiring the user to input basic information of the user, including a name and an identification number (if the user is an old user, the user does not need to input the name and the identification number), and completing basic verification.
And then, the tendering bank palm life application program is invoked (if necessary, the downloading can be guided), meanwhile, the background transmits the basic information of the user to the tendering bank palm life application program background, the palmtop life requires the user to log in, and checks whether the logged-in user is consistent with the basic information of the user acquired by the background, the form and means of user check can be determined by the tendering bank palm life application program in full right, and the safety and the flexibility are controlled by the tendering bank palm life application program. And the user confirms the signed three-party protocol content, and then the user selects and agrees to sign.
And finally, the tenderer bank palm life application program transmits the user basic information, the tenderer bank palm life account information and the signed protocol number of the user back to the payment application program. The foreground also jumps back to the payment application program, and the user confirms the account binding relationship again in the payment application program. The flow ends.
As shown in fig. 7, an embodiment of a second aspect of the embodiment of the present disclosure provides a computer device 1, which includes a memory 12, a processor 14, and a computer program stored on the memory 12 and capable of running on the processor 14, and when the processor 14 executes the computer program, the steps of the information processing method according to any one of the above embodiments are implemented, so that all beneficial technical effects of the information processing method are achieved, and are not described herein again.
In particular, the memory 12 described above may include mass storage for data or instructions. By way of example, and not limitation, memory 12 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 12 may include removable or non-removable (or fixed) media, where appropriate. The memory 12 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 12 is a non-volatile solid-state memory. In a particular embodiment, the memory 12 includes Read Only Memory (ROM). Where appropriate, the ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory or a combination of two or more of these.
Processor 14 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured as one or more integrated circuits implementing embodiments of the present disclosure.
An embodiment of the third aspect of the embodiments of the present disclosure provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the information processing method according to any of the above embodiments, so that all the beneficial technical effects of the information processing method are achieved, and are not described herein again.
Computer readable storage media may include any medium that can store or transfer information. Examples of computer readable storage media include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
The technical scheme of the embodiment of the disclosure is described in detail with reference to the accompanying drawings, and the embodiment of the disclosure provides an information processing scheme in a payment signing process, wherein a user account payment three-party protocol is signed by confirming user basic information and associated account information of a user, and payment is also completed by using a protocol number in a subsequent payment process, so that user experience is improved, and the security of user privacy information is ensured. Specifically, a user selects a bank (or other asset management mechanisms) needing authentication and signing at a product entrance of a payment company, a payment application program verifies basic user information to complete real-name verification, the basic user information is transmitted to the bank application program (or other asset management mechanism application programs, which are described as examples below) through a background interface, the bank application program completes user login, identity verification and privacy verification (identity verification and privacy verification are identity authentication), signing of a payment three-party protocol is completed, and then signing information is returned to an initiated payment application program through the background interface.
The above description is only a preferred embodiment of the present disclosure and is not intended to limit the present disclosure, and various modifications and changes may be made to the present disclosure by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the disclosed embodiments should be included in the scope of protection of the disclosed embodiments.